A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals

Citation
M. Frantzen et al., A framework for understanding vulnerabilities in firewalls using a dataflow model of firewall internals, COMPUT SEC, 20(3), 2001, pp. 263-270
Citations number
11
Categorie Soggetti
Computer Science & Engineering
Journal title
COMPUTERS & SECURITY
ISSN journal
01674048 → ACNP
Volume
20
Issue
3
Year of publication
2001
Pages
263 - 270
Database
ISI
SICI code
0167-4048(2001)20:3<263:AFFUVI>2.0.ZU;2-H
Abstract
Vulnerabilities in vendor as well as freeware implementations of firewalls continue to emerge at a rapid pace. Each vulnerability superficially appear s to be the result of something such as a coding flaw in one case, or a con figuration weakness in another. Given the large number of firewall vulnerab ilities that have surfaced in recent years, it is important to develop a co mprehensive framework for understanding both what firewalls actually do whe n they receive incoming traffic and what can go wrong when they process thi s traffic. An intuitive starting point is to create a firewall dataflow mod el composed of discrete processing stages that reflect the processing chara cteristics of a given firewall. These stages do not necessarily all occur i n all firewalls, nor do they always conform to the sequential order indicat ed in this paper. This paper also provides a more complete view of what hap pens inside a firewall, other than handling the filtering and possibly othe r rules that the administrator may have established. Complex interactions t hat influence the security that a firewall delivers frequently occur. Firew all administrators too often blindly believe that filtering rules solely de cide the fate of any given packet. Distinguishing between the surface funct ionality (i.e., functionality related to packet filtering) and the deeper, dataflow-related functionality of firewalls provides a framework for unders tanding vulnerabilities that have surfaced in firewalls.