Bilgilendirme: Sürüm Güncellemesi ve versiyon yükseltmesi nedeniyle, geçici süreyle zaman zaman kesintiler yaşanabilir ve veri içeriğinde değişkenlikler gözlemlenebilir. Göstereceğiniz anlayış için teşekkür ederiz.
 

The 1st Workshop on Model-Based Verification & Validation: Directed Acyclic Graph Modeling of Security Policies for Firewall Testing

dc.contributor.author Tuğlular, Tuğkan
dc.contributor.author Kaya, Özgür
dc.contributor.author Müftüoğlu, Can Arda
dc.contributor.author Belli, Fevzi
dc.contributor.other 03.04. Department of Computer Engineering
dc.contributor.other 03. Faculty of Engineering
dc.contributor.other 01. Izmir Institute of Technology
dc.coverage.doi 10.1109/SSIRI.2009.52
dc.date.accessioned 2016-11-16T13:35:33Z
dc.date.available 2016-11-16T13:35:33Z
dc.date.issued 2009
dc.description 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009; Shanghai; China; 8 July 2009 through 10 July 2009 en_US
dc.description.abstract Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically generated for firewall testing. The approach proposed follows test case generation algorithm developed for event sequence graphs. Under a local area network setup with the aid of a specifically developed software for this purpose, generated test cases are converted to network test packets, test packets are sent to the firewall under test (FUT), and sent packets are compared with passed packets to determine test result. en_US
dc.identifier.citation Tuğlular, T., Kaya, Ö., Müftüoğlu, C. A., and Belli, F. (2009, July 8-10). The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing. Paper presented at the 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009. doi:10.1109/SSIRI.2009.52 en_US
dc.identifier.doi 10.1109/SSIRI.2009.52
dc.identifier.isbn 9780769537580
dc.identifier.scopus 2-s2.0-72849151217
dc.identifier.uri http://doi.org/10.1109/SSIRI.2009.52
dc.identifier.uri http://hdl.handle.net/11147/2457
dc.language.iso en en_US
dc.publisher Institute of Electrical and Electronics Engineers Inc. en_US
dc.relation.doi 10.1109/SSIRI.2009.52 en_US
dc.relation.ispartof 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009 en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Network security en_US
dc.subject Directed acyclic graphs en_US
dc.subject Event Sequence graphs en_US
dc.subject Firewall policies en_US
dc.subject Security testing en_US
dc.title The 1st Workshop on Model-Based Verification & Validation: Directed Acyclic Graph Modeling of Security Policies for Firewall Testing en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.id TR114656
gdc.author.institutional Tuğlular, Tuğkan
gdc.author.institutional Belli, Fevzi
gdc.author.institutional Müftüoğlu, Can Arda
gdc.author.institutional Tuğlular, Tuğkan
gdc.coar.access open access
gdc.coar.type text::conference output
gdc.description.department İzmir Institute of Technology. Computer Engineering en_US
gdc.description.endpage 398 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality N/A
gdc.description.startpage 393 en_US
gdc.description.wosquality N/A
gdc.identifier.openalex W2128429374
gdc.identifier.wos WOS:000274878700053
gdc.openalex.fwci 0.339
gdc.openalex.normalizedpercentile 0.77
gdc.opencitations.count 7
gdc.scopus.citedcount 6
gdc.wos.citedcount 5
relation.isAuthorOfPublication 0f216971-d901-422e-9020-40f6636ca9ac
relation.isAuthorOfPublication 7f52fb71-3121-46a6-a461-2ff1b28d9fa1
relation.isAuthorOfPublication.latestForDiscovery 0f216971-d901-422e-9020-40f6636ca9ac
relation.isOrgUnitOfPublication 9af2b05f-28ac-4014-8abe-a4dfe192da5e
relation.isOrgUnitOfPublication 9af2b05f-28ac-4004-8abe-a4dfe192da5e
relation.isOrgUnitOfPublication 9af2b05f-28ac-4003-8abe-a4dfe192da5e
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4014-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2457.pdf
Size:
855.68 KB
Format:
Adobe Portable Document Format
Description:
Conference Paper

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: