unreachable rules are shadowed by default. The
respective checks for these rules can be skipped.
This is also true for initial rules which are always
reachable and unshadowed.
• Parallelization - The overall performance can be
improved by parallelizing parts of the application.
Especially, the building and solving of unreacha-
bility and shadowing formulas is completely in-
dependent and can be processed in parallel. Also,
parts of the building process may be parallelized
as well.
• Expressiveness - There are further interesting fea-
tures for the policy anomaly detection like the
support for stateful firewalling or the considera-
tion of effects introduced by VPN-tunnels.
REFERENCES
Abedin, M., Nessa, S., Khan, L., and Thuraisingham, B. M.
(2006). Detection and Resolution of Anomalies in
Firewall Policy Rules. In Data and Applications Secu-
rity, 20th Annual IFIP WG 11.3 Working Conference
on Data and Applications Security 2006, Proceedings,
pages 15–29.
Al-Shaer, E. S. and Hamed, H. H. (2003). Firewall Pol-
icy Advisor for Anomaly Discovery and Rule Edit-
ing. In Integrated Network Management VII, Manag-
ing It All, IFIP/IEEE Eighth International Symposium
on Integrated Network Management (IM 2003), pages
17–30.
Al-Shaer, E. S. and Hamed, H. H. (2004). Discovery of
Policy Anomalies in Distributed Firewalls. In INFO-
COM 2004. Twenty-third AnnualJoint Conference of
the IEEE Computer and Communications Societies,
volume 4, pages 2605–2616.
Arkko, J. and Baker, F. (2011). Guidelines for Using
IPv6 Transition Mechanisms during IPv6 Deploy-
ment. RFC 6180.
Baier, C. and Katoen, J.-P. (2008). Principles of model
checking. The MIT Press.
Biere, A., Heljanko, K., Junttila, T. A., Latvala, T., and
Schuppan, V. (2006). Linear Encodings of Bounded
LTL Model Checking. Logical Methods in Computer
Science, 2(5).
Biondi, P. and Ebalard, A. (2006). Scapy and IPv6 network-
ing. Slides from http://www.secdev.org/conf/scapy-
IPv6 HITB06.pdf.
Caicedo, C. E., Joshi, J. B., and Tuladhar, S. R. (2009). IPv6
Security Challenges. Computer, 42(2):36–42.
Cook, S. A. (1971). The Complexity of Theorem-Proving
Procedures. Technical report, University of Toronto.
Een, N. and Sorensson, N. A minimalis-
tic and high-performance SAT solver.
https://github.com/niklasso/minisat.
Emerson, E. A. and Halpern, J. Y. (1986). ”Sometimes”
and ”Not Never” revisited: on branching versus linear
time temporal logic. Journal of the Association for
Computing Machinery (JACM), 33(1):151–178.
Golnabi, K., Min, R., Khan, L., and Al-Shaer, E. (2006).
Analysis of Firewall Policy Rules Using Data Min-
ing Techniques. In Network Operations and Manage-
ment Symposium, 2006. NOMS 2006. 10th IEEE/IFIP,
pages 305–315.
Google (2015). Google IPv6 - Statistics.
https://www.google.com/intl/en/ipv6/statistics.html.
IDSv6-Project (2013). Exemplary ip6tables init script.
http://www.idsv6.de/Downloads/iptables ruleset.sh.
Jeffrey, A. and Samak, T. (2009). Model Checking Fire-
wall Policy Configurations. In POLICY, pages 60–67.
IEEE Computer Society.
Kaufmann, B., Schaub, T., and et. al. (2012). A
conflict-driven nogood learning answer set solver.
http://www.cs.uni-potsdam.de/clasp/.
Kotenko, I. and Polubelova, O. (2011). Verification of secu-
rity policy filtering rules by Model Checking. In IEEE
6th International Conference on Intelligent Data Ac-
quisition and Advanced Computing Systems: Technol-
ogy and Applications, IDAACS 2011, Prague, Czech
Republic, September 15-17, 2011, Volume 2, pages
706–710. IEEE.
Kozen, D. (1983). Results on the Propositional mu-
Calculus. Theor. Comput. Sci., 27:333–354.
Kripke, S. (1963). Semantical Considerations on Modal
Logic. Acta Philosophica Fennica, 16:83–94.
Lorenz, C. (2014). Paper Discussion: Policy Ad-
visor and FIREMAN. Technical report,
University of Potsdam. http://www.cs.uni-
potsdam.de/bs/research/docs/techreports/2014/l14.pdf.
NetCitadel (2012). FirewallBuilder. www.fwbuilder.org.
Pivotal Software (2014). Redis Documentation.
http://redis.io/documentation.
Pnueli, A. (1977). The Temporal Logic of Programs. In
18th Annual Symposium on Foundations of Computer
Science, Providence, Rhode Island, USA, 31 October
- 1 November 1977, pages 46–57. IEEE Computer So-
ciety.
Poole, D. and Mackworth, A. (2010). Lecture
3.2 on Artificial Intelligence. Slides from
http://artint.info/slides/ch03/lect2.pdf.
Welte, H. and Ayuso, P. N. (2014).
The netfilter.org ”iptables” project.
http://www.netfilter.org/projects/iptables/.
Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C.-N., and Mo-
hapatra, P. (2006). FIREMAN: A Toolkit for FIRE-
wall Modeling and ANalysis. In IEEE Symposium on
Security and Privacy, pages 199–213. IEEE Computer
Society.
PolicyAnomalyDetectionforDistributedIPv6Firewalls
219