首页> 外文会议>Critical Information Infrastructures Security; Lecture Notes in Computer Science; 4347 >Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
【24h】

Modelling and Analysing Network Security Policies in a Given Vulnerability Setting

机译:在给定漏洞设置中对网络安全策略进行建模和分析

获取原文
获取原文并翻译 | 示例

摘要

The systematic protection of critical information infrastructures requires an analytical process to identify the critical components and their interplay, to determine the threats and vulnerabilities, to assess the risks and to prioritise countermeasures where risk is unacceptable. This paper presents an integrated framework for model-based symbolic interpretation, simulation and analysis with a comprehensive approach focussing on the validation of network security policies. A graph of all possible attack paths is automatically computed from the model of an ICT network, of vulnerabilities, exploits and an attacker strategy. Constraints on this graph are given by a model of the network security policy. The impact of changes to security policies can be computed and visualised by finding differences in the attack graphs. A unique feature of the presented approach is, that abstract representations of these graphs can be computed that allow comparison of focussed views on the behaviour of the system. This guides optimal adaptation of the security policy to the given vulnerability setting.
机译:对关键信息基础架构的系统保护需要一个分析过程,以识别关键组件及其相互影响,确定威胁和漏洞,评估风险并在无法接受风险的情况下确定对策的优先级。本文提出了一个用于基于模型的符号解释,仿真和分析的集成框架,其中采用了一种专注于网络安全策略验证的综合方法。从ICT网络,漏洞,攻击和攻击者策略的模型中自动计算出所有可能的攻击路径的图形。此图的约束由网络安全策略模型给出。通过发现攻击图中的差异,可以计算并可视化更改安全策略的影响。所提出的方法的独特之处在于,可以计算这些图的抽象表示,从而可以比较聚焦的视图对系统行为的影响。这指导安全策略针对给定的漏洞设置进行最佳调整。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号