Skip to main content

Advertisement

Table 3 Implemented test cases

From: The role and security of firewalls in cyber-physical cloud computing

ID Name
A IP
1 Valid ICMP Request
2 Checksum invalid
3 Invalid packet length
4 Invalid header length
5 Reserved flag unequal zero
6 IP protocol number unequal ICMP, TCP, or UDP
B Fragmentation
7 Benign fragmentation
8 Overlapping fragmentation
9 Overlapping fragmentation without terminating fragment
10 Overlapping fragmentation in reverse order
11 Tiny fragments
C Transport layer protocols
12 Invalid source port (TCP)
13 Invalid source port (UDP)
14 Invalid destination port (TCP)
15 Invalid destination port (UDP)
16 Invalid checksum (TCP)
17 Invalid checksum (UDP)
D TCP flags
18 Null packet (no flags)
19 SYN, FIN
20 SYN, FIN, PSH
21 SYN, FIN, RST
22 SYN, FIN, RST, PSH
23 FIN
E Stateful behavior
24 SYN in established connection
25 ACK without ACK number
F Application layer
26 Improper HTTP request