Papers
Topics
Authors
Recent
Search
2000 character limit reached

ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report)

Published 15 Feb 2019 in cs.CR | (1902.05689v1)

Abstract: Firewall configuration is critical, yet often conducted manually with inevitable errors, leaving networks vulnerable to cyber attack [40]. The impact of misconfigured firewalls can be catastrophic in Supervisory Control and Data Acquisition (SCADA) networks. These networks control the distributed assets of industrial systems such as power generation and water distribution systems. Automation can make designing firewall configurations less tedious and their deployment more reliable. In this paper, we propose ForestFirewalls, a high-level approach to configuring SCADA firewalls. Our goals are three-fold. We aim to: first, decouple implementation details from security policy design by abstracting the former; second, simplify policy design; and third, provide automated checks, pre and post-deployment, to guarantee configuration accuracy. We achieve these goals by automating the implementation of a policy to a network and by auto-validating each stage of the configuration process. We test our approach on a real SCADA network to demonstrate its effectiveness.

Citations (1)

Summary

  • The paper introduces an automated system that simplifies SCADA firewall configuration using high-level abstractions and formal verification.
  • It employs a layered, rigorously tested methodology to transform high-level policies into concise, vendor-specific configurations.
  • The approach reduces configuration complexity and eliminates misconfigurations, ensuring compliance with industry best practices in critical networks.

ForestFirewalls: Automated, Correct Firewall Configuration for Critical SCADA Networks

The "ForestFirewalls" technical report (1902.05689) presents a comprehensive system for automating the configuration of firewalls in Supervisory Control and Data Acquisition (SCADA) networks. The work addresses the acute challenges of manual firewall configuration in critical infrastructure, where misconfigurations can have severe safety and financial consequences. The system leverages high-level abstractions, formal verification, and automated testing to ensure correctness, efficiency, and compliance with industry best practices.

Motivation and Problem Statement

SCADA networks underpin critical infrastructure such as power generation and water distribution. These environments are characterized by legacy devices with limited security capabilities, long upgrade cycles, and a high cost of failure. Manual firewall configuration in such settings is error-prone, complex, and often performed by personnel lacking deep networking expertise. Existing vendor tools and abstractions (e.g., Cisco security levels, Firmato) fail to provide topology-independent, high-level policy specification or robust verification mechanisms.

The ForestFirewalls system is designed to:

  • Decouple security policy design from low-level implementation details.
  • Simplify policy specification using high-level, vendor-neutral abstractions.
  • Provide automated, multi-stage verification and validation of firewall configurations, both pre- and post-deployment.

System Architecture and Workflow

ForestFirewalls introduces a layered, automated pipeline for firewall configuration, depicted in the following process: Figure 1

Figure 1: The ForestFirewalls firewall auto-configuration process, from high-level policy to device-specific configuration and verification.

The workflow consists of:

  1. High-Level Policy Specification: Users define security policies using a domain-specific language, abstracted from network topology and device specifics.
  2. Intermediate-Level (IL) Policy Generation: The high-level policy is parsed into an intermediate representation for formal analysis.
  3. Network Topology Coupling: The policy is mapped onto the actual network topology, described in GraphML, to generate a network-level, vendor-neutral policy.
  4. Formal Verification: Policies are checked for best-practice compliance and internal consistency using canonicalization and the Alloy model checker.
  5. Device-Level Configuration Generation: Vendor-specific configurations are rendered using templates.
  6. Automated Testing: Configurations are validated in emulated and real environments using automated test scripts and traffic generation.

Security Abstractions: The Refined Zone-Conduit Model

A central innovation is the use of a refined Zone-Conduit abstraction, based on but extending the ANSI/ISA model. In this model:

  • Zones group systems with similar security requirements.
  • Conduits represent secure communication paths between zones, abstracting the enforcement mechanism (e.g., firewalls).

ForestFirewalls enforces a strict 1:1 mapping between policies and conduits, introduces Firewall-Zones and Abstract-Zones for management and serial firewall requirements, and prohibits sub-zones to avoid policy ambiguity. This results in a tight, automatable specification suitable for high-assurance environments. Figure 2

Figure 2: Policy specification in layers, supporting both non-expert and expert users through high-level language, class libraries, and grammar rules.

Policy Specification Framework

The policy specification framework is layered to support both non-expert users (e.g., plant engineers) and expert programmers:

  • High-Level Language: Intuitive syntax for defining services, service groups, zones, and policy rules. Only positive, explicit permissions are allowed; implicit or generic rules (e.g., all-TCP) are prohibited.
  • Class Library Layer: Object-oriented classes for protocol and service construction, with attribute validation.
  • Grammar Layer: BNF rules enforce language semantics and delegate detailed checks to the class library.

This approach enables concise, readable, and maintainable policy definitions. For example, a policy that would require 2720 lines of device-level configuration can be specified in only 80 high-level lines.

Formal Verification and Canonicalization

ForestFirewalls employs a multi-tiered verification strategy: Figure 3

Figure 3: Policy verification tiers, including best-practice compliance, emulation-based testing, and live network validation.

  • Best-Practice Compliance: Policies are canonicalized—distinct rule sets with equivalent semantics are mapped to a unique representation—enabling efficient equivalence and inclusion checks against industry standards. Figure 4

Figure 4

Figure 4

Figure 4: Canonicalisation of distinct rule sets of the same policy, ensuring semantic equivalence despite syntactic differences.

  • Formal Model Checking: The Alloy analyzer is used to detect rule overlaps, redundancies, and conflicts in both high-level and network-level policies. Counter-examples are provided for debugging. Figure 5

    Figure 5: Counter-example thrown by Alloy, indicating a high-level policy error due to overlapping rules.

  • Automated Testing: Emulated environments (Netkit) and real networks are used to validate that only explicitly permitted services are allowed, with exhaustive port scans to ensure negative vetting.

Application to Real SCADA Networks

The system was evaluated on a real (anonymized) SCADA network comprising multiple zones and heterogeneous firewalls (Cisco ASA and Linux IPtables). The policy goals included strict inter-zone access controls, defense-in-depth via diverse firewall vendors, and comprehensive reporting. Figure 6

Figure 6: The SCADA network under study, illustrating the segmentation and firewall placement.

ForestFirewalls generated device-level configurations that were:

  • Order-of-magnitude more concise: 714 lines vs. 2720 lines in the original manual configuration.
  • Free of generic or implicit rules: No all-TCP, all-UDP, or all-IP rules; all permissions are explicit.
  • Efficient and non-redundant: No obsolete ACLs or intra-ACL interactions.
  • Formally verified: No rule overlaps or best-practice violations after correction of initial errors detected by Alloy. Figure 7

Figure 7

Figure 7: System generated security models of the network, including Zone-Firewall and Zone-Conduit representations.

Implications and Future Directions

ForestFirewalls demonstrates that high-level, formally verified, and automated firewall configuration is feasible and effective for critical infrastructure. The approach yields significant reductions in configuration complexity, eliminates common classes of misconfiguration, and provides strong guarantees of policy correctness and compliance.

Practical implications include:

  • Enabling non-expert personnel to manage firewall policies safely.
  • Rapid adaptation to network changes without compromising security.
  • Scalable configuration and verification for large, heterogeneous environments.

Theoretical implications involve the formalization of policy semantics, the use of canonicalization for efficient policy comparison, and the application of model checking to configuration validation.

Future work may extend the system to:

  • Automate deployment to hardware devices.
  • Integrate with SDN controllers for dynamic policy enforcement.
  • Expand the reporting framework for real-time monitoring and incident response.
  • Generalize the approach to other types of security middleboxes.

Conclusion

ForestFirewalls provides a robust, automated solution to the persistent problem of firewall misconfiguration in SCADA and other critical networks. By combining high-level abstractions, formal verification, and automated testing, the system achieves correctness, efficiency, and compliance unattainable with manual or vendor-specific tools. The methodology and architecture presented are broadly applicable to the secure management of complex, heterogeneous networked systems.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.