Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Avishai Wool is active.

Publication


Featured researches published by Avishai Wool.


IEEE Computer | 2004

A quantitative study of firewall configuration errors

Avishai Wool

The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the companys needs. Configuration is a crucial task, probably the most important factor in the security a firewall provides.


ACM Transactions on Computer Systems | 2004

Firmato : A novel firewall management toolkit

Yair Bartal; Alain J. Mayer; Kobbi Nissim; Avishai Wool

In recent years packet-filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security <i>management</i> technology is lacking. In this paper we present <i>Firmato</i>, a firewall management toolkit, with the following distinguishing properties and components: (1) an entity-relationship model containing, in a unified form, global knowledge of the security policy and of the network topology; (2) a model definition language, which we use as an interface to define an instance of the entity-relationship model; (3) a model compiler, translating the global knowledge of the model into firewall-specific configuration files; and (4) a graphical firewall rule illustrator. We implemented a prototype of our toolkit to work with several commercially available firewall products. This prototype was used to control an operational firewall for several months. We believe that our approach is an important step toward streamlining the process of configuring and managing firewalls, especially in complex, multi-firewall installations.


SIAM Journal on Computing | 1998

The Load, Capacity, and Availability of Quorum Systems

Moni Naor; Avishai Wool

A quorum system is a collection of sets (quorums) every two of which have a nonempty intersection. Quorum systems have been used for a number of applications in the area of distributed systems. We investigate the load, capacity and availability of quorum systems. A protocol that uses a quorum system S needs to access some quorum occasionally, which causes work to be done by the elements (processors) of the chosen quorum. If the protocol uses a strategy w which picks a quorum Sj with probability wj, then the load on an element i is the probability that i is accessed. The load C(S) is defined to be the minimalload on the busiest element, minimizing over the strategies. The capacity Cap(S) is defined to be the highest rate of quorum accesses that the system S can handle. We show that for any quorum system, Cap(S) = l/C(S). Therefore all the information regarding the capacity is captured by L(S), which further motivates our emphasis on low load quorum systems. Moreover, our proof yields a method to approach a capacity of l/L(S). Assuming that the elements are not reliable, then the question of the availability of S arises. The availability of a quorum system S is the probability that at least one quorum survives, assuming that each element fails independently with probability p. A tradeoff between L(S) and the availability of S is shown. None of the existing constructions of quorum systems achieves simultaneously good availability and low load. We present four novel constructions of quorum system, all featuring optimal or near optimal load, and high availability. These desirable properties of the constructions translate into improvements of any protocol using them: a low work load on the processors and a high resilience to processor failures. The best construction, based on paths in a grid, has a load of O(l/fi),


ieee symposium on security and privacy | 1999

Firmato: a novel firewall management toolkit

Yair Bartal; Alain J. Mayer; Kobbi Nissim; Avishai Wool

In recent years, packet filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and widespread deployment. In contrast, firewall and security management technology is lacking. We present Firmato, a firewall management toolkit, with the following distinguishing properties and components: (1) an entity relationship model containing, in a unified form, global knowledge of the security policy and of the network topology; (2) a model definition language, which we use as an interface to define an instance of the entity relationship model; (3) a model compiler translating the global knowledge of the model into firewall-specific configuration files; and (4) a graphical firewall rule illustrator. We demonstrate Firmatos capabilities on a realistic example, thus showing that firewall management can be done successfully at an appropriate level of abstraction. We implemented our toolkit to work with a commercially available firewall product. We believe that our approach is an important step towards streamlining the process of configuring and managing firewalls, especially in complex, multi firewall installations.


international conference on mobile systems, applications, and services | 2005

Cracking the Bluetooth PIN

Yaniv Shaked; Avishai Wool

This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods. Our fastest optimization employs an algebraic representation of a central cryptographic primitive (SAFER+) used in Bluetooth. Our results show that a 4-digit PIN can be cracked in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.


Information & Computation | 1995

The availability of quorum systems

David Peleg; Avishai Wool

A quorum system is a collection of sets (quorums) every two of which have a nonempty intersection. Quorum systems have been used for a number of applications in the area of distributed systems. In this paper we study the fault-tolerance properties of quorum systems, and their implications on quorum based distributed protocols.


European Journal of Operational Research | 1994

Computational Experience with Approximation Algorithms for the Set Covering Problem

Tal Grossman; Avishai Wool

The Set Covering Problem (SCP) is a well known combinatorial optimization problem, which is NP-hard. We conducted a comparative study of eight different approximation algorithms for the SCP, including several greedy variants, fractional relaxations, randomized algorithms and a neural network algorithm. The algorithms were tested on a set of random-generated problems with up to 500 rows and 5000 columns, and on two sets of problems originating in combinatorial questions with up to 28160 rows and 11264 columns. On the random problems and on one set of combinatorial problems, the best algorithm among those we tested was the neural network algorithm, with greedy variants very close in second and third place. On the other set of combinatorial problems, the best algorithm was a greedy variant and the neural network performed quite poorly. The other algorithms we tested were always inferior to the ones mentioned above.


Information & Computation | 2001

Probabilistic Quorum Systems

Dahlia Malkhi; Michael K. Reiter; Avishai Wool; Rebecca N. Wright

We initiate the study of probabilistic quorum systems, a technique for providing consistency of replicated data with high levels of assurance despite the failure of data servers. We show that this technique offers effective load reduction on servers and high availability. We explore probabilistic quorum systems both for services tolerant of benign server failures and for services tolerant of arbitrary (Byzantine) ones. We also prove bounds on the server load that can be achieved with these techniques.


international conference on management of data | 1998

Replication, consistency, and practicality: are these mutually exclusive?

Todd A. Anderson; Yuri Breitbart; Henry F. Korth; Avishai Wool

Previous papers have postulated that traditional schemes for the management of replicated data are doomed to failure in practice due to a quartic (or worse) explosion in the probability of deadlocks. In this paper, we present results of a simulation study for three recently introduced protocols that guarantee global serializability and transaction atomicity without resorting to the two-phase commit protocol. The protocols analyzed in this paper include a global locking protocol [10], a “pessimistic” protocol based on a replication graph [5], and an “optimistic” protocol based on a replication graph [7]. The results of the study show a wide range of practical applicability for the lazy replica-update approach employed in these protocols. We show that under reasonable contention conditions and sufficiently high transaction rate, both replication-graph-based protocols outperform the global locking protocol. The distinctions among the protocols in terms of performance are significant. For example, an offered load where 70% - 80% of transactions under the global locking protocol were aborted, only 10% of transactions were aborted under the protocols based on the replication graph. The results of the study suggest that protocols based on a replication graph offer practical techniques for replica management. However, it also shows that performance deteriorates rapidly and dramatically when transaction throughput reaches a saturation point.


International Journal of Critical Infrastructure Protection | 2013

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems

Niv Goldenberg; Avishai Wool

The Modbus/TCP protocol is commonly used in SCADA systems for communications between a human–machine interface (HMI) and programmable logic controllers (PLCs). This paper presents a model-based intrusion detection system designed specifically for Modbus/TCP networks. The approach is based on the key observation that Modbus traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique deterministic finite automaton (DFA). An algorithm is presented that can automatically construct the DFA associated with an HMI-PLC channel based on about 100 captured messages. The resulting DFA-based intrusion detection system looks deep into Modbus/TCP packets and produces a very detailed traffic model. This approach is very sensitive and is able to flag anomalies such as a message appearing out of its position in the normal sequence or a message referring to a single unexpected bit. The intrusion detection approach is tested on a production Modbus system. Despite its high sensitivity, the system has a very low false positive rate—perfect matches of the model to the traffic were observed for five of the seven PLCs tested without a single false alarm over 111 h of operation. Furthermore, the intrusion detection system successfully flagged real anomalies that were caused by technicians who were troubleshooting the HMI system. The system also helped identify a PLC that was configured incorrectly.

Collaboration


Dive into the Avishai Wool's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Peleg

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yair Bartal

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge