Academia.eduAcademia.edu

Outline

Modeling Firewalls Using Hierarchical Colored Petri Nets

Abstract

This paper concentrates on one technological aspect of providing communications security, firewall technology. It introduces a formalism called Hierarchical Colored Petri Nets (HCPN) in tutorial style. The main contribution of the paper is a description of how to model firewall systems using Hierarchical Colored Petri Nets. A byproduct of this approach is a novel way of modeling audit streams in distributed systems. HCPNs are well suited for modeling concurrent, distributed systems in which regulated flows of information are ...

References (50)

  1. R. Atkinson. RFC-1825 Security Architecture for the In- ternet Protocol. Network Working Group, Aug. 1995.
  2. R. Atkinson. RFC-1826 IP Authentication Header. Net- work Working Group, Aug. 1995.
  3. F. M. Avolio and M. J. Ranum. A Network Perime- ter with Secure External Access. In 2 Ò Symposium on Network and Distributed System Security (NDSS), San Diego, California, Feb. 1994. Internet Society (ISOC).
  4. F. M. Avolio and M. J. Ranum. A Toolkit and Meth- ods for Internet Firewalls. In Technical Summer Confer- ence, pages 37-44, Boston, Massachusetts, June 1994. USENIX.
  5. M. L. Bailey, B. Gopal, M. A. Pagls, L. L. Peterson, and P. Sarkar. PathFinder: A Pattern-Based Packet Classi- fier. In Proceedings of the 1 ר Symposium on Operating System Design and Implementation (OSDI), Monterey, California, Nov. 1994. USENIX.
  6. S. M. Bellovin and W. R. Cheswick. Firewalls and In- ternet Security. Addison-Wesley Publishing Company, Inc., 1994.
  7. F. P. Brooks, Jr. The Mythical Man-Month. Addison- Wesley Publishing Company, Inc., second edition, 1995.
  8. C. J. Calabrese. A Tool for Building Firewall-Router Configurations. The USENIX Association, Computing Systems, 9(3):239-253, Summer 1996.
  9. D. B. Chapman. Network (In)Security Through IP Packet Filtering. In Proceedings of the 3 Ö USENIX UNIX Security Symposium, Baltimore, Maryland, Sept. 1992. USENIX.
  10. D. B. Chapman and E. D. Zwicky. Building Internet Firewalls. O'Reilley & Associates, Inc., Sebastopol, California, Sept. 1995.
  11. D. E. Comer. IP over ATM: Concept and Practice. In- terop talk on IP over ATM, Mar. 1996.
  12. T. H. Cormen, C. E. Leiserson, and R. L. Rivest. In- troduction to Algorithms. MIT Press, Cambridge, Mas- sachusetts, 1990.
  13. J. D. Day and H. Zimmermann. The OSI Reference Model. In Proceedings of the IEEE, volume 71, pages 1334-1340. IEEE, Dec. 1983.
  14. Digital Equipment Corporation (DEC). Screening Exter- nal Access Link (SEAL) Introductory Guide, 1992.
  15. K. B. Egevang and P. Francis. RFC-1631 The IP Network Address Translator (NAT). Network Working Group, May 1994.
  16. S. Garfinkel and G. Spafford. Practical UNIX & Inter- net Security. O'Reilley & Associates, Inc., Sebastopol, California, second edition, 1996.
  17. C. A. Heuser and G. Richter. Constructs for Modeling Information Systems with Petri Nets. In K. Jensen, ed- itor, 13 Ø International Conference on Application and Theory of Petri Nets, number 616 in Lecture Notes in Computer Science, Sheffield, UK, 1992. Springer Ver- lag.
  18. J. D. Howard. An Analysis Of Security Incidents On The Internet 1989-1995. PhD thesis, Carnegie Mellon Uni- versity, Apr. 1997.
  19. P. Huber, K. Jensen, and R. M. Shapiro. Hierarchies in Coloured Petri Nets. In G. Rozenberg, editor, Advances in Petri Nets, number 524 in Lecture Notes in Computer Science. Springer Verlag, 1991.
  20. D. Icove, K. Seger, and W. VonStorch. Computer Crime. O'Reilley & Associates, Inc., Sebastopol, California, 1995.
  21. R. Janicki and M. Koutny. Optimal Simulations, Nets, and Reachability Graphs. In G. Rozenberg, editor, Advances in Petri Nets, number 524 in Lecture Notes in Computer Science, pages 205-226. Springer Verlag, 1991.
  22. K. Jensen. Coloured Petri Nets: A High Level Language for System Design and Analysis. In G. Rozenberg, edi- tor, Advances in Petri Nets, number 524 in Lecture Notes in Computer Science. Springer Verlag, 1991.
  23. K. Jensen. Coloured Petri Nets: Basic Concepts, Anal- ysis Methods, and Practical Use, volume 2. Springer- Verlag, New York Inc., 1995.
  24. K. Jensen. Coloured Petri Nets: Basic Concepts, Anal- ysis Methods, and Practical Use, volume 1. Springer- Verlag, New York Inc., second edition, 1996.
  25. K. Jensen. Design/CPN Overview of CPN ML Syntax. Version 3.0, 1996.
  26. C. E. Landwehr. Formal Models for Computer Security. ACM Computing Surveys, 13(3):247-278, Sept. 1981.
  27. D. Longley and M. Shain. Data & Computer Security. Dictionary of Standards, Concepts, and Terms. Macmil- lan Publishers Ltd., 1987.
  28. W. W. McLendon, Jr. and R. F. Vidale. Analysis of an Ada System Using Coloured Petri Nets and Occurrence Graphs. In K. Jensen, editor, 13 Ø International Confer- ence on Application and Theory of Petri Nets, number 616 in Lecture Notes in Computer Science, pages 384- 388, Sheffield, UK, 1992. Springer Verlag.
  29. Meta Software Corporation. Design/CPN Reference Manual. Cambridge, Massachusetts, 1993.
  30. R. Milner. The Standard ML Core Language. Techni- cal Report CSR-168-84, Edinburgh University Internal Report, 1984.
  31. S. S. Owicki and L. Lamport. Proving Liveness Prop- erties of Concurrent Programs. ACM Transactions on Programming Languages and Systems, pages 455-495, July 1982.
  32. J. L. Peterson. Petri Net Theory and the Modeling of Systems. Prentice-Hall, Englewood Cliffs, New Jersey, 1981.
  33. C. A. Petri. Kommunikation mit Automaten. Technical Report 2 (Schriften des IIM), Institut für Instrumentelle Mathematik, Bonn, Germany, 1962.
  34. H. Plünnecke and W. Reisig. Bibliography on Petri Nets 1990. In G. Rozenberg, editor, Advances in Petri Nets, number 524 in Lecture Notes in Computer Science. Springer Verlag, 1991. Over 4000 references to publica- tions dealing with Petri Nets.
  35. A. Pnueli. The Temporal Logic of Programs. In 18 Ø Symposium on the Foundations of Computer Science, pages 46-57, Nov. 1977.
  36. J. Postel, editor. RFC-791 Internet Protocol. Informa- tion Science Institute, University of Southern California, Sept. 1981.
  37. J. Postel, editor. RFC-792 Internet Control Message Protocol. Information Sciences Institute, University of Southern California, Sept. 1981.
  38. K. E. Price. Host-Based Misuse Detection and Conven- tional Operating Systems' Audit Data Collection. Mas- ter's thesis, Department of Computer Sciences, Purdue University, West Lafayette, Indiana, Dec. 1997.
  39. M. J. Ranum. A Network Firewall. In Proceedings of the 1 ר International Conference on Systems and Network Security and Management (SANS-I), June 1992.
  40. M. J. Ranum. Internet Firewalls -An Overview, Oct. 1993. (unpublished).
  41. M. J. Ranum. Thinking About Firewalls. In Proceedings of the 2 Ò International Conference on Systems and Net- work Security and Management (SANS-II), Apr. 1993.
  42. M. J. Ranum, A. Leibowitz, B. Chapman, and B. Boyle. Firewalls-FAQ, 1994.
  43. C. L. Schuba. On the Modeling, Design, and Imple- mentation of Firewall Technology. PhD thesis, Depart- ment of Computer Sciences, Purdue University, West Lafayette, Indiana, Dec. 1997.
  44. C. L. Schuba and E. H. Spafford. A Reference Model for Firewall Technology. In Proceedings of the 13 Ø An- nual Computer Security Applications Conference (AC- SAC), pages 133-145, San Diego, California, Dec. 1997. IEEE Computer Society.
  45. R. Sethi. Programming Languages. Concepts and Con- structs. Addison-Wesley Publishing Company, Inc., 1990.
  46. M. Silva and R. Valette. Petri Nets and Flexible Man- ufacturing. In G. Rozenberg, editor, Advances in Petri Nets, Lecture Notes in Computer Science. Springer Ver- lag, 1989.
  47. K. Siyan and C. Hare. Internet firewalls and network security. New Riders Pub., Indianapolis, Indiana, 1995.
  48. Å. Wikström. Functional Programming Using Standard ML. Prentice-Hall, Englewood Cliffs, New Jersey, 1987.
  49. N. Wirth. Program Development by Stepwise Refine- ment. Commun. ACM, 14(4):221-227, Apr. 1971.
  50. M. Young. Private communication, 1997.