Analysis of vulnerabilities in internet firewalls

S Kamara, S Fahmy, E Schultz, F Kerschbaum… - Computers & …, 2003 - Elsevier
S Kamara, S Fahmy, E Schultz, F Kerschbaum, M Frantzen
Computers & Security, 2003Elsevier
Firewalls protect a trusted network from an untrusted network by filtering traffic according to a
specified security policy. A diverse set of firewalls is being used today. As it is infeasible to
examine and test each firewall for all possible potential problems, a taxonomy is needed to
understand firewall vulnerabilities in the context of firewall operations. This paper describes
a novel methodology for analyzing vulnerabilities in Internet firewalls. A firewall vulnerability
is defined as an error made during firewall design, implementation, or configuration, that can …
Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel methodology for analyzing vulnerabilities in Internet firewalls. A firewall vulnerability is defined as an error made during firewall design, implementation, or configuration, that can be exploited to attack the trusted network that the firewall is supposed to protect. We examine firewall internals, and cross-reference each firewall operation with causes and effects of weaknesses in that operation, analyzing twenty reported problems with available firewalls. The result of our analysis is a set of matrices that illustrate the distribution of firewall vulnerability causes and effects over firewall operations. These matrices are useful in avoiding and detecting unforeseen problems during both firewall implementation and firewall testing. Two case studies of Firewall-1 and Raptor illustrate our methodology.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果