Skip to main content

Mutating Network Models to Generate Network Security Test Cases

  • Chapter
Mutation Testing for the New Century

Part of the book series: The Springer International Series on Advances in Database Systems ((ADBS,volume 24))

  • 348 Accesses

Abstract

Security testing is normally limited to the scanning of individual hosts with the goal of locating vulnerabilities that can be exploited to gain some improper level of access on the target network Scanning is a successful approach for discovering security problems, but it suffers from two major problems. First, it ignores security issues that can arise due to interactions of systems on a network. Second, it does not provide any concept of test coverage other than the obvious criteria of attempting all known exploitation techniques on every system on the network.

In this paper, I present a new method for generating security test cases for a network This method extends my previous work in model checking network security by defining mutant operators to apply to my previously defined network security model. The resulting mutant models are fed into a model checker to produce counterexamples. These counterexamples represent attack scenarios (test cases) that can be run against the network. I also define a new coverage criterion for network security that requires a much smaller set of exploits to be run against the network to verify the network’s security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Apache Web Server information and software on the web at www.apache.com.

    Google Scholar 

  2. B. Beizer, “Software Testing Techniques, 2nd edition,” Thomson Computer Press, 1990.

    Google Scholar 

  3. J. Birch, E. Clark, K. McMillan, D. Dill, and L.J. Hwang, Symbolic Model Checking: 1020 States and Beyond, Proceedings of the ACM/SIGDA International Workshop in Formal Methods in VLSI Design, January, 1991.

    Google Scholar 

  4. W. Chan, R. Anderson, P. Beame, S. Bums, E Modugno, and D. Notkin, Model Checking Large Software Specifications, IEEE Transactions on Software Engineering, Vol. 24, No. 7, July 1998.

    Google Scholar 

  5. E. Clark, O. Grumberg, and D. Long, Verification Tools For Finite-State Concurrent Systems, A Decade of Concurrency–Reflections and Perspectives, Springer Verlag, 1994.

    Google Scholar 

  6. Computer Oracle and Password System (COPS) information and software on the web at ftp.cert.org /pub/tools/cops.

  7. G. Holzmann, The Model Checker SPIN, IEEE Transactions on Software Engineering, Vol 23, No 5, May 1997.

    Google Scholar 

  8. Internet Security Systems, System Scanner information on the web at www.iss.net .

  9. A. Mayer, A. Wool and E. Ziskind, Fang: A Firewall Analysis Engine, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 2000.

    Google Scholar 

  10. Network Associates, CyberCop Scanner information on the web at www.nai.com /aspset/products/tns/ccscanner intro.asp.

  11. J. Offutt, Practical Mutation Testing, Twelfth International Conference on Testing Computer Software, pages 99–109, Washington, DC, June 1995.

    Google Scholar 

  12. RedHat Linux information and software on the web at www.redhat.com .

  13. R. Ritchey and P. Ammann, Using Model Checking To Analyze Network Security, 2000 IEEE Symposium on Security and Privacy, May 2000.

    Google Scholar 

  14. SMV information and software on the web at www.cs.cmu.edu/–modelcheck.

  15. D. Zerkle and K. Levitt, NetKuang–A Multi-Host Configuration Vulnerability Checker, In Proceedings of the Sixth USENIX Unix Security Symposium, San Jose, CA, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ritchey, R.W. (2001). Mutating Network Models to Generate Network Security Test Cases. In: Wong, W.E. (eds) Mutation Testing for the New Century. The Springer International Series on Advances in Database Systems, vol 24. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-5939-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-5939-6_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-4888-5

  • Online ISBN: 978-1-4757-5939-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics