The 1st Workshop on Model-Based Verification & Validation: Directed Acyclic Graph Modeling of Security Policies for Firewall Testing
dc.contributor.author | Tuğlular, Tuğkan | |
dc.contributor.author | Kaya, Özgür | |
dc.contributor.author | Müftüoğlu, Can Arda | |
dc.contributor.author | Belli, Fevzi | |
dc.contributor.other | 03.04. Department of Computer Engineering | |
dc.contributor.other | 03. Faculty of Engineering | |
dc.contributor.other | 01. Izmir Institute of Technology | |
dc.coverage.doi | 10.1109/SSIRI.2009.52 | |
dc.date.accessioned | 2016-11-16T13:35:33Z | |
dc.date.available | 2016-11-16T13:35:33Z | |
dc.date.issued | 2009 | |
dc.description | 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009; Shanghai; China; 8 July 2009 through 10 July 2009 | en_US |
dc.description.abstract | Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically generated for firewall testing. The approach proposed follows test case generation algorithm developed for event sequence graphs. Under a local area network setup with the aid of a specifically developed software for this purpose, generated test cases are converted to network test packets, test packets are sent to the firewall under test (FUT), and sent packets are compared with passed packets to determine test result. | en_US |
dc.identifier.citation | Tuğlular, T., Kaya, Ö., Müftüoğlu, C. A., and Belli, F. (2009, July 8-10). The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing. Paper presented at the 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009. doi:10.1109/SSIRI.2009.52 | en_US |
dc.identifier.doi | 10.1109/SSIRI.2009.52 | |
dc.identifier.isbn | 9780769537580 | |
dc.identifier.scopus | 2-s2.0-72849151217 | |
dc.identifier.uri | http://doi.org/10.1109/SSIRI.2009.52 | |
dc.identifier.uri | http://hdl.handle.net/11147/2457 | |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.doi | 10.1109/SSIRI.2009.52 | en_US |
dc.relation.ispartof | 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Network security | en_US |
dc.subject | Directed acyclic graphs | en_US |
dc.subject | Event Sequence graphs | en_US |
dc.subject | Firewall policies | en_US |
dc.subject | Security testing | en_US |
dc.title | The 1st Workshop on Model-Based Verification & Validation: Directed Acyclic Graph Modeling of Security Policies for Firewall Testing | en_US |
dc.type | Conference Object | en_US |
dspace.entity.type | Publication | |
gdc.author.id | TR114656 | |
gdc.author.institutional | Tuğlular, Tuğkan | |
gdc.author.institutional | Belli, Fevzi | |
gdc.author.institutional | Müftüoğlu, Can Arda | |
gdc.author.institutional | Tuğlular, Tuğkan | |
gdc.coar.access | open access | |
gdc.coar.type | text::conference output | |
gdc.description.department | İzmir Institute of Technology. Computer Engineering | en_US |
gdc.description.endpage | 398 | en_US |
gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
gdc.description.scopusquality | N/A | |
gdc.description.startpage | 393 | en_US |
gdc.description.wosquality | N/A | |
gdc.identifier.openalex | W2128429374 | |
gdc.identifier.wos | WOS:000274878700053 | |
gdc.openalex.fwci | 0.339 | |
gdc.openalex.normalizedpercentile | 0.77 | |
gdc.opencitations.count | 7 | |
gdc.scopus.citedcount | 6 | |
gdc.wos.citedcount | 5 | |
relation.isAuthorOfPublication | 0f216971-d901-422e-9020-40f6636ca9ac | |
relation.isAuthorOfPublication | 7f52fb71-3121-46a6-a461-2ff1b28d9fa1 | |
relation.isAuthorOfPublication.latestForDiscovery | 0f216971-d901-422e-9020-40f6636ca9ac | |
relation.isOrgUnitOfPublication | 9af2b05f-28ac-4014-8abe-a4dfe192da5e | |
relation.isOrgUnitOfPublication | 9af2b05f-28ac-4004-8abe-a4dfe192da5e | |
relation.isOrgUnitOfPublication | 9af2b05f-28ac-4003-8abe-a4dfe192da5e | |
relation.isOrgUnitOfPublication.latestForDiscovery | 9af2b05f-28ac-4014-8abe-a4dfe192da5e |