10/09/2006CIS Dept., UMass Dartmouth1 A Petri Net Based XML Firewall Security Model for Web Services Invocation Prof. Haiping Xu Concurrent Software Systems.

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
11/19/2007 CIS Dept., UMass Dartmouth 1 DRBD: Dynamic Reliability Block Diagram for System Reliability Modeling Prof. Haiping Xu Concurrent Software Systems.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Lecture 15 Introduction to Web Services Web Service Applications.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Copyright © 2013 Curt Hill SOAP Protocol for exchanging data and Enabling Web Services.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Module 7: Advanced Application and Web Filtering.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 7: Implementing Security Using Group Policy.
Web Services An Introduction Copyright © Curt Hill.
Intro to Web Services Dr. John P. Abraham UTPA. What are Web Services? Applications execute across multiple computers on a network.  The machine on which.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security fundamentals
What is a Firewall?.
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Server Concepts Dr. Charles W. Kann.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Fire-wall.
Firewall.
Firewalls.
Protection Mechanisms in Security Management
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

10/09/2006CIS Dept., UMass Dartmouth1 A Petri Net Based XML Firewall Security Model for Web Services Invocation Prof. Haiping Xu Concurrent Software Systems Laboratory Computer and Information Science Department University of Massachusetts Dartmouth

10/09/2006CIS Dept., UMass Dartmouth2 Outline  Web Services and XML Firewall  XML Firewall Architecture  Introduction to Petri Nets  Petri Net Models for XML Firewall  Formal Analysis of Petri Net Models  Conclusions and Future Work

10/09/2006CIS Dept., UMass Dartmouth3 Introduction to Web Services  Web Services are Internet-based software components that support open, XML-based standards and communication protocols.  A Web Service is a software component defined using WSDL, registered using UDDI, and invoked using SOAP.  Web Services make software functionality available over the Internet.

10/09/2006CIS Dept., UMass Dartmouth4 Web Services Roles  Service Provider  Service Provider implements the service and makes it available on the internet.  Service Requester  Service Requester utilizes an existing web service by opening a network connection and sending a request.  Service Broker  Service Broker is centralized directory of the web services.

10/09/2006CIS Dept., UMass Dartmouth5 Security Issues in Web Services Invocation  A very common way of accessing web services is to remotely invoke web services.  A service provider may be under attack if a consumer uses a false identity to invoke a web service. a consumer accesses a web service without properly assigned permissions. a consumer attempts to corrupt a web service by attacking the service provider (e.g., using a denial of service attack).

10/09/2006CIS Dept., UMass Dartmouth6 Conventional Firewall  Firewall:  Firewall: a fireproof wall used as a barrier to prevent the spread of a fire.  Firewall: a component that limits network access.  Types of firewalls packet filtering application proxy personal firewall Server Machines Firewall Client Machines Internet

10/09/2006CIS Dept., UMass Dartmouth7 Why XML Firewall ?  A conventional firewall typically does not block port 80 used by HTTP, so malicious web service requests cannot be blocked. does not support parsing or validating XML data. does not support authentication and authorization for web services access.  An XML firewall can control access to web services rather than simply to filter untrusted addresses. inspect a complete XML message including its head and data segments. support authentication and authorization for web services invocation.

10/09/2006CIS Dept., UMass Dartmouth8 Features of the XML Firewall  Grant only those users who are properly authenticated and authorized for access of web services.  Use role base access control (RBAC) for authorization.  Develop security policies by identifying security threats.  Develop policy rules based on system state.  Examine the contents of the incoming traffic.

10/09/2006CIS Dept., UMass Dartmouth9 Protecting Service Provider XML Firewall Request Application Logic Web Service 1 Web Service n Admin Policy Change Request User Interface … Response Request User State Info Service Provider Response Application (Service Consumer)

10/09/2006CIS Dept., UMass Dartmouth10 XML Firewall Architecture User LoginComputational Logic [valid user] authenticate user [valid] [invalid] Assign Role UserinfoDB Create User Space StateDB PolicyDB Access Request Invoke Service Web Service 1Web Service n Return Results check_ permissions [access passed] RoleDB [access denied] … XML Firewall Application

10/09/2006CIS Dept., UMass Dartmouth11 Introduction to Petri Net  “Three-in-one” capability of Petri net models [Murata 1989] Graphical representation Mathematical description Simulation tool  Definition: A Petri net is a 4-tuple, PN = (P, T, F, M 0 ) where P = {P1, P2, …, Pm} is a finite set of places; T = {t1, t2, …, tn} is a finite set of transitions; F  (P x T)  (T x P) is a set of arcs (flow relation); M 0 : P --> {0, 1, 2, 3, …} is the initial marking.

10/09/2006CIS Dept., UMass Dartmouth12 An Example P4 P2 P5 t1 t5 t3 t4 t2 P1 P3

10/09/2006CIS Dept., UMass Dartmouth13 Petri Net Model of an Application

10/09/2006CIS Dept., UMass Dartmouth14 Petri Net Model of XML Firewall

10/09/2006CIS Dept., UMass Dartmouth15 Adding Policy Change Interface

10/09/2006CIS Dept., UMass Dartmouth16 Formal Analysis of the XML Firewall Model  To help ensure a correct design that meets certain specifications  To meet certain requirements such as liveness, deadlock freeness and concurrency  Use Petri net tool: INA (Integrated Net Analyzer) Verifying structural properties Verifying behavioral properties Detecting design errors

10/09/2006CIS Dept., UMass Dartmouth17 Formal Analysis for the Application Model Deciding structural boundedness The net is structurally bounded. The net is bounded. Computation of the reachability graph States generated: 238 The net has no dead transitions at the initial marking. The net has no dead reachable states. The net is safe. Liveness test: Computing the strongly connected components The net is live. The net is live, if dead transitions are ignored. The net is live and safe. The net is reversible (resetable).

10/09/2006CIS Dept., UMass Dartmouth18 Formal Analysis for the XML Firewall Model Deciding structural boundedness The net is structurally bounded. The net is bounded. Computation of the reachability graph States generated: 126 Write the state numbers of the dead states? Y/N Y The net has dead reachable states. The net is not live. The net is not live and safe. The net is not reversible (resetable). The deadlock-trap-property is not valid. The net has no dead transitions at the initial marking. The net is not live, if dead transitions are ignored. The net is safe. The dead states are shown as follows State nr. 39 P.nr: toks:

10/09/2006CIS Dept., UMass Dartmouth19 Corrected XML Firewall Model Start_Authorization Access_Request Create_ Session Fail User_Request Computational_ Logic Init/Result WS_Request Check_If_Existing First_Time _User Existing_User Perform_ Background_ Check BG_Check_DB Check_ _Failed Check_ Passed Update_ Databases Role_DB Assign_Role Fetch_State _Info User_Role Policy_DB Fetch_ Policy Create_UserSpace UserSpace (Username, Permissions, Session) Check_Permission Pass Access _Failed WS_Logic Accept _Result Accept_WS_Response FW_ Result UserInfo_DB StateInfo Valid_User _Request Access_ Denied State_DB Application Permission_Result Change_Policy_ Request New_Policy Check_Conflict Reject_Policy Computational_ Logic Init/Result Policy_Change Interface Administrator Update_PolicyAccept_Policy Sync Decision

10/09/2006CIS Dept., UMass Dartmouth20 Formal Analysis for the Corrected XML Firewall Model Deciding structural boundedness The net is structurally bounded. The net is bounded. Computation of the reachability graph States generated: 84 The net has no dead transitions at the initial marking. The net has no dead reachable states. The net is safe. Liveness test: Computing the strongly connected components The net is live. The net is live, if dead transitions are ignored. The net is live and safe. The net is reversible (resetable).

10/09/2006CIS Dept., UMass Dartmouth21 Concluding Comments  An architectural design of the role-based XML firewall has been proposed.  Petri net based formal models for XML firewall have been developed.  Used existing Petri net tools to formally analyze XML firewall models.  Design errors, such as deadlocks, can be automatically detected.

10/09/2006CIS Dept., UMass Dartmouth22 Future Work  Refine the Petri net model of the XML firewall for detailed design.  Use case study, such as health care application, to illustrate how to design security policies.  Develop a prototype of the XML firewall based on the Petri net based formal model to show the feasibility of our approach.

10/09/2006CIS Dept., UMass Dartmouth23 Questions ?? Thank you for your attention! The slides for this talk may be downloaded from