TY - JOUR
T1 - Modeling and evaluating the security threats of transient errors in firewall software
AU - Chen, Shuo
AU - Xu, Jun
AU - Kalbarczyk, Zbigniew
AU - Iyer, Ravishankar K.
AU - Whisnant, Keith
N1 - Funding Information:
This work is supported in part by NSF Grant CCR 00-86096 ITR, in part by a grant from Motorola Inc. as part of Motorola Center for Communications and in part by MURI Grant N00014-01-1-0576.
PY - 2004/3
Y1 - 2004/3
N2 - This paper experimentally evaluates and models the error-caused security vulnerabilities and the resulting security violations on two Linux kernel firewalls: IPChains and Netfilter. There are two major aspects to this work: to conduct extensive error injection experiments on the Linux kernel and to quantify the possibility of error-caused security violations using a Stochastic Activity Network (SAN) model. The error injection experiments show that about 2% of errors injected into the firewall code segment cause security vulnerabilities. Two types of error-caused security vulnerabilities are distinguished: temporary, which disappear when the error disappears, and permanent, which persist even after the error is removed, as long as the system is not rebooted. Results from simulating the SAN model indicate that under an error rate of 0.1 error per day during a 1-year period in a networked system protected by 20 firewalls, two machines (on the average) will experience security violations. This indicates that error-caused security vulnerabilities can be a non-negligible source of a security threat to a highly secure system.
AB - This paper experimentally evaluates and models the error-caused security vulnerabilities and the resulting security violations on two Linux kernel firewalls: IPChains and Netfilter. There are two major aspects to this work: to conduct extensive error injection experiments on the Linux kernel and to quantify the possibility of error-caused security violations using a Stochastic Activity Network (SAN) model. The error injection experiments show that about 2% of errors injected into the firewall code segment cause security vulnerabilities. Two types of error-caused security vulnerabilities are distinguished: temporary, which disappear when the error disappears, and permanent, which persist even after the error is removed, as long as the system is not rebooted. Results from simulating the SAN model indicate that under an error rate of 0.1 error per day during a 1-year period in a networked system protected by 20 firewalls, two machines (on the average) will experience security violations. This indicates that error-caused security vulnerabilities can be a non-negligible source of a security threat to a highly secure system.
KW - Firewall software
KW - SAN model
KW - Security
KW - Transient errors
UR - http://www.scopus.com/inward/record.url?scp=1042288833&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=1042288833&partnerID=8YFLogxK
U2 - 10.1016/j.peva.2003.07.013
DO - 10.1016/j.peva.2003.07.013
M3 - Article
AN - SCOPUS:1042288833
SN - 0166-5316
VL - 56
SP - 53
EP - 72
JO - Performance Evaluation
JF - Performance Evaluation
IS - 1-4
ER -