Firewall tests have to be performed to verify that the firewall works as specified. In this work, a test case generation approach is developed, which defines test cases based on the firewall rule sequence and uses real traffic database to prepare test packets. Test packets can be used or injected to check if the firewall implementation is erroneous, i.e. the rules do not correspond to the actions of the firewall. Although injection based firewall testing is accepted as an inefficient way of testing firewall implementations in the literature [1], there has been no alternative method developed yet. Most of the academic work focuses on testing of firewall rules where firewall implementation is assumed error-free. Even if firewall implementatio...
Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, d...
Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of...
One of the key challenges in computer networks is network security. For securing the network, variou...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
Abstract — Firewall development and implementation are constantly being improved to accommodate high...
5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011;...
We propose a combined approach for test case generation to uncover errors both in firewall software ...
34th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 201...
The implementation of network security devices such as firewalls and IDSs are constantly being impro...
International audienceFirewalls are an important means to secure critical ICT infrastructures. As co...
3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009...
The article of record as published may be found at https://doi.org/10.1145/3372318.3372323The abilit...
In today's global world, most corporations are bound to have an Internet presence. This phenomenon h...
Firewalls are the most critical and widely deployed intrusion prevention systems. A firewall is a s...
Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, d...
Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of...
One of the key challenges in computer networks is network security. For securing the network, variou...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
This paper proposes an all encompassing test methodology for firewalls. It extends the life cycle mo...
Abstract — Firewall development and implementation are constantly being improved to accommodate high...
5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011;...
We propose a combined approach for test case generation to uncover errors both in firewall software ...
34th Annual IEEE International Computer Software and Applications Conference Workshops, COMPSACW 201...
The implementation of network security devices such as firewalls and IDSs are constantly being impro...
International audienceFirewalls are an important means to secure critical ICT infrastructures. As co...
3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009...
The article of record as published may be found at https://doi.org/10.1145/3372318.3372323The abilit...
In today's global world, most corporations are bound to have an Internet presence. This phenomenon h...
Firewalls are the most critical and widely deployed intrusion prevention systems. A firewall is a s...
Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, d...
Firewalls, packet filters placed at the boundary of a network in order to screen incoming packets of...
One of the key challenges in computer networks is network security. For securing the network, variou...