Filters








3,575 Hits in 10.9 sec

Industrial Experience Report on the Formal Specification of a Packet Filtering Language Using the K Framework

Gurvan Le Guernic, Benoit Combemale, José A. Galindo
2017 Electronic Proceedings in Theoretical Computer Science  
This paper reports on an industrial experiment on using a tool-supported language specification framework (K) for the formal specification of the syntax and semantics of a filtering language having a complexity  ...  This experimentation aims at estimating, in a specific industrial setting, the difficulty and benefits of formally specifying a packet filtering language using a tool-supported formal approach.  ...  This paper is an industrial experience report on the use of a tool-supported language specification framework (the K framework) for the formal specification of the syntax and semantics of a filtering language  ... 
doi:10.4204/eptcs.240.3 fatcat:jhhbu3ecgfhqdolcdfizltarra

An Effective and Efficient Approach to Improve Visibility Over Network Communications

Marco Zuppelli, Alessandro Carrega, Matteo Repetto
2021 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In this paper, we investigate the use of the extended Berkeley Packet Filter for inspecting network communications.  ...  We show how this framework can be employed to selectively gather various information describing a network conversation (e.g., packet headers), in order to spot emerging threats like malicious software  ...  Acknowledgments This work was supported in part by the European Commission under Grant Agreements no. 786922 (ASTRID), no. 833456 (GUARD), and no. 833042 (SIMARGL).  ... 
doi:10.22667/jowua.2021.12.31.089 dblp:journals/jowua/ZuppelliCR21 fatcat:rc2kidy2wbbgzgncrw4ih3ubsa

Correct by Construction Networks Using Stepwise Refinement

Leonid Ryzhyk, Nikolaj Bjørner, Marco Canini, Jean-Baptiste Jeannin, Cole Schlesinger, Douglas B. Terry, George Varghese
2017 Symposium on Networked Systems Design and Implementation  
We present Cocoon, a framework for SDN development that facilitates both the design and verification of complex networks using stepwise refinement to move from a high-level specification to the final network  ...  The former is verified at design time, while the latter is checked at run time using statically defined invariants. We present six different SDN use cases including B4 and F10.  ...  Experience with the Cocoon language We briefly report on our experience with the Cocoon language.  ... 
dblp:conf/nsdi/RyzhykBCJSTV17 fatcat:7hu2shh4p5cqhl6brbodn2tvba

VeriFi: Model-Driven Runtime Verification Framework for Wireless Protocol Implementations [article]

Jinghao Shi, Shuvendu Lahiri, Ranveer Chandra, Geoffrey Challen
2018 arXiv   pre-print
VERIFI takes a formal model of the protocol being verified as input. To achieve good coverage, it first applies state reachability analysis by applying model checking techniques.  ...  It then uses a new PACKETSNIPER component to selectively trigger packet losses required to quickly investigate all reachable protocol states.  ...  The suite contains the UPPAAL language specification and a model checker implemented using constraint-solving techniques.  ... 
arXiv:1808.03406v1 fatcat:huhmn4fttbdatpdvqwzbjr7s34

A domain-specific language for filtering in application-level gateways

Hampus Balldin, Christoph Reichenbach
2020 Proceedings of the 19th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences  
We have designed the language around the needs of network filter developers, with a focus on correctness: our language can statically verify several properties of filter programs, such as well-formedness  ...  Application-level packet filtering is a technique for network access control in which an "application-level gateway" intercepts network packets at the application level (e.g., HTTP, FTP), scans them for  ...  Acknowledgments We thank Advenica AB and especially the anonymous test subject for support and feedback, and Per Runeson for advice on experimental setup.  ... 
doi:10.1145/3425898.3426955 fatcat:kfgvwmtuxnek5nn6ohwexfkc5i

Firewall Policy Advisor for Anomaly Discovery and Rule Editing [chapter]

Ehab S. Al-Shaer, Hazem H. Hamed
2003 Integrated Network Management VIII  
In addition, inserting or modifying a filtering rule requires thorough analysis of the relationship between this rule and other rules in order to determine the proper order of this rule and commit the  ...  The Firewall Policy Advisor significantly simplifies the management of any generic firewall policy written as filtering rules, while minimizing network vulnerability due to firewall rule misconfiguration  ...  We would also like to thank Lopamudra Roychoudhuri and Yongning Tang for their useful comments on an earlier version of this paper.  ... 
doi:10.1007/978-0-387-35674-7_2 fatcat:pvqxc3vzzrdrtna37wl6qbl5lq

Formal firewall conformance testing: an application of test and proof techniques

Achim D. Brucker, Lukas Brügger, Burkhart Wolff
2014 Software testing, verification & reliability  
The presented approach is supported by a test framework that allows to test actual firewalls using the test cases generated based on the formal model.  ...  This paper presents a formal model of both stateless and stateful firewalls (packet filters), including network address translation (NAT), to which a specification-based conformance test case generation  ...  The policies used were discussed with experts from industry to ensure that the evaluation fulfils the need of industrial partners from the telecommunication industry.  ... 
doi:10.1002/stvr.1544 fatcat:smgnzys3bnbv3egcu6hfrljnga

Adding Support for Automatic Enforcement of Security Policies in NFV Networks

Cataldo Basile, Fulvio Valenza, Antonio Lioy, Diego R. Lopez, Antonio Pastor Perales
2019 Zenodo  
models that allow the optimal selection of the NSFs to use.  ...  These models are built on a formalization of the NSF capabilities, which serves to unequivocally describe what NSFs are able to do for security policy enforcement purposes.  ...  As an example, we report how to define the capabilities of a generic packet filter that supports the FMR, supports explicit default actions and a another packet filter that also supports time-based conditions  ... 
doi:10.5281/zenodo.3266876 fatcat:s7teqqivo5dghmcu767cqlz6cm

SymbexNet: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications

JaeSeung Song, Cristian Cadar, Peter Pietzuch
2014 IEEE Transactions on Software Engineering  
stateless and stateful protocols, respectively) and then (2) use these packets to detect potential violations of manual rules derived from the protocol specification, and check the interoperability of  ...  The core idea behind our approach is to (1) automatically generate high-coverage test input packets for a network protocol implementation using single-and multi-packet exchange symbolic execution (targeting  ...  The language uses packet expressions of the following form: packet expression ¼ pktfS filters g; where pkt is a name given to the packet to be matched, and S filters is a set of packet filter predicates  ... 
doi:10.1109/tse.2014.2323977 fatcat:d2ifdvnvqffdzl4hidxyj7xavu

A misuse-based network Intrusion Detection System using Temporal Logic and stream processing

Abdulbasit Ahmed, Alexei Lisitsa, Clare Dixon
2011 2011 5th International Conference on Network and System Security  
1, 1, 1, z 9 , z 10 , z 11 , z 12 ) → ♦ [0,1] (∃k 9 , k 10 , k 11 , k 12 )P (x 3 , x 4 , x 1 , x 2 , S B , S A + 1, 1, 1, k 9 , k 10 , k 11 , k 12 ))))) The above formula is the formula of the specification  ...  During their experiments, the best of what BRO achieved with using a file that contain a denial of service attacks was 35,000 packets/sec, but with the loss of few packets.  ...  The first line of the grammar file specifies the name of the file as stored in the file system. The options section specify the options set to be used for processing this grammar file.  ... 
doi:10.1109/icnss.2011.6059953 dblp:conf/nss/AhmedLD11 fatcat:lsgkv7acf5aujbe4oa6lgaaoh4

Editorial: Strategic directions in computing research

Peter Wegner, Jon Doyle
1996 ACM Computing Surveys  
The March 1996 issue, on "Perspectives in Computer Science," examined the status of the discipline, while the present issue looks to the future with a collection of reports on "Strategic Directions in  ...  The reports collectively provide a remarkably deep, though incomplete, view of the field and its future challenges.  ...  The report addresses the balance between research and teaching and between long-term and industrial needs, and recommends more emphasis on the needs of industry in advanced courses.  ... 
doi:10.1145/242223.242227 fatcat:j45e32dvqvbbdmvzbvymkmreyu

Semantics-aware detection of targeted attacks: a survey

Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser
2016 Journal in Computer Virology and Hacking Techniques  
However, few of these solutions have a particular focus on Advanced Persistent Threats or similarly sophisticated multi-stage attacks.  ...  To overcome these obstacles, we present a structured review of semantics-aware works that have a high potential for contributing to the analysis or detection of targeted attacks.  ...  The financial support by the Austrian Federal Ministry of Science, Research and Economy and the National Foundation for Research, Technology and Development is gratefully acknowledged.  ... 
doi:10.1007/s11416-016-0273-3 fatcat:flhbpc4uwbandby2adxi62t64u

Policy-based Management: A Historical Perspective

Raouf Boutaba, Issam Aib
2007 Journal of Network and Systems Management  
The focus will be on providing a synthesized chronicle of the evolution of ideas and research trends rather than on surveying the various specification formalisms, frameworks, and application domains of  ...  The focus will be on providing a synthesized chronicle of the evolution of ideas and research trends rather than on surveying the various specification formalisms, frameworks, and application domains of  ...  An intra-firewall policy anomaly defines the existence of two or more filtering rules that may match the same packet or the existence of a rule that can never match any packet on the network paths that  ... 
doi:10.1007/s10922-007-9083-8 fatcat:cftw6c3tibggvgujqlnlmlyf4q

Revelio: ML-Generated Debugging Queries for Distributed Systems [article]

Pradeep Dogga
2021 arXiv   pre-print
By injecting faults and training on logs and reports from 800 Mechanical Turkers, we show that Revelio includes the most helpful query in its predicted list of top-3 relevant queries 96% of the time.  ...  The key challenges lie in (1) combining inputs of different types (e.g., natural language reports and quantitative logs) and (2) generalizing to unseen faults.  ...  As output, Revelio generates a ranked list of top-k debugging queries that are directly executable on the target debugging framework(s) (e.g., Jaeger [101] ) and highlight the root cause of the fault.  ... 
arXiv:2106.14347v1 fatcat:vciiecgg2nbuveevn7np56huea

Performance analysis of time-enhanced UML diagrams based on stochastic processes

Christoph Lindemann, Axel Thümmler, Alexander Klemm, Marco Lohmann, Oliver P. Waldhorst
2002 Proceedings of the third international workshop on Software and performance - WOSP '02  
The applicability of our approach for practical performance and dependability projects is demonstrated by an UML specification of the General Packet Radio Service, a packet switched extension in GSM wireless  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.  ...  that are widely used in industry.  ... 
doi:10.1145/584374.584375 fatcat:jrhlw54nkrhelfauu4lyeka3dq
« Previous Showing results 1 — 15 out of 3,575 results