Engineering Journal: Science and InnovationELECTRONIC SCIENCE AND ENGINEERING PUBLICATION
Certificate of Registration Media number Эл #ФС77-53688 of 17 April 2013. ISSN 2308-6033. DOI 10.18698/2308-6033
  • Русский
  • Английский
Article

Logical analysis of firewall configurational correctness

Published: 18.11.2013

Authors: Devyatkov V.V., Myo Than Tun 

Published in issue: #11(23)/2013

DOI: 10.18698/2308-6033-2013-11-988

Category: Information technology | Chapter: Information Security

This article focuses on static analysis for firewall configuration errors. In contrast to the well-known works in this paper we propose to describe the behavior of the firewalls as process models and not as access control lists ACL (ACL - Access Control Lists).The expressive possibilities of process models are much wider and more developed that allow describing a much more complex model of the configuration software. Static analysis is proposed to realize by the methods of logic programming as a proof properties of the configuration process that is much more elegant, full and unfettered approach to validate the configuration of firewalls. Requirements (properties) of correctness is proposed to formalize in the language of modal logic. The formal description of the properties is transformed in the goal of Prolog. The article gives examples of logic programs to validate the configuration of firewalls in Prolog and the results of their tests.