Boolean Expressions in Firewall Analysis

05/03/2022
by   Adam Hamilton, et al.
0

Firewall policies are an important line of defence in cybersecurity, specifying which packets are allowed to pass through a network and which are not. These firewall policies are made up of a list of interacting rules. In practice, firewall can consist of hundreds or thousands of rules. This can be very difficult for a human to correctly configure. One proposed solution is to model firewall policies as Boolean expressions and use existing computer programs such as SAT solvers to verify that the firewall satisfies certain conditions. This paper takes an in-depth look at the Boolean expressions that represent firewall policies. We present an algorithm that translates a list of firewall rules into a Boolean expression in conjunctive normal form (CNF) or disjunctive normal form (DNF). We also place an upper bound on the size of the CNF and DNF that is polynomial in the number of rules in the firewall policy. This shows that past results suggesting a combinatorial explosion when converting from a Boolean expression in CNF to one in DNF does note occur in the context of firewall analysis

READ FULL TEXT
research
03/19/2019

A tighter bound on the number of relevant variables in a bounded degree Boolean function

A classical theorem of Nisan and Szegedy says that a boolean function wi...
research
02/13/2018

REAS: Combining Numerical Optimization with SAT Solving

In this paper, we present ReaS, a technique that combines numerical opti...
research
08/11/2017

Lower bound for monotone Boolean convolution

Any monotone Boolean circuit computing the n-dimensional Boolean convolu...
research
05/09/2022

Worst-case Analysis for Interactive Evaluation of Boolean Provenance

In recent work, we have introduced a framework for fine-grained consent ...
research
01/06/2018

On the inherent competition between valid and spurious inductive inferences in Boolean data

Inductive inference is the process of extracting general rules from spec...
research
06/08/2023

Boosting-based Construction of BDDs for Linear Threshold Functions and Its Application to Verification of Neural Networks

Understanding the characteristics of neural networks is important but di...
research
08/21/2020

A Heuristic Approach to Two Level Boolean Minimization Derived from Karnaugh Mapping

The following paper presents a heuristic method by which sum-of-product ...

Please sign up or login with your details

Forgot password? Click here to reset