Skip to main content

Table 3 Implemented test cases

From: The role and security of firewalls in cyber-physical cloud computing

ID

Name

A

IP

1

Valid ICMP Request

2

Checksum invalid

3

Invalid packet length

4

Invalid header length

5

Reserved flag unequal zero

6

IP protocol number unequal ICMP, TCP, or UDP

B

Fragmentation

7

Benign fragmentation

8

Overlapping fragmentation

9

Overlapping fragmentation without terminating fragment

10

Overlapping fragmentation in reverse order

11

Tiny fragments

C

Transport layer protocols

12

Invalid source port (TCP)

13

Invalid source port (UDP)

14

Invalid destination port (TCP)

15

Invalid destination port (UDP)

16

Invalid checksum (TCP)

17

Invalid checksum (UDP)

D

TCP flags

18

Null packet (no flags)

19

SYN, FIN

20

SYN, FIN, PSH

21

SYN, FIN, RST

22

SYN, FIN, RST, PSH

23

FIN

E

Stateful behavior

24

SYN in established connection

25

ACK without ACK number

F

Application layer

26

Improper HTTP request