首页> 外文会议>IFIP/IEEE International Symposium on Integrated Network Management >A formal approach for network security management based on qualitative risk analysis
【24h】

A formal approach for network security management based on qualitative risk analysis

机译:基于定性风险分析的网络安全管理正式方法

获取原文

摘要

The risk analysis is an important process for enforcing and strengthening efficient and effective security. Due to the significant growth of the Internet, application services, and associated security attacks, information professionals face challenges in assessing risk of their networks. The assessment of risk may vary with the enterprise's requirements. Hence, a generic risk analysis technique is suitable. Moreover, configuring a network with correct security policy is a difficult problem. The assessment of risk aids in realizing necessary security policy. Risk is a function of security threat and impact. Security threats depend on the traffic reachability. Security devices like firewalls are used to selectively allow or deny traffic. However, the connection between the network risk and the security policy is not easy to establish. A small modification in the network topology or in the security policy, can change the risk significantly. It is hard to manually follow a systematic process for configuring the network towards security hardening. Hence, an automatic generation of proper security controls, e.g., firewall rules and host placements in the network topology, is crucial to keep the overall security risk low. In this paper, we first present a declarative model for the qualitative risk analysis. We consider transitive reachability, i.e., reachability considering one or more intermediate hosts, in order to compute exposure of vulnerabilities. Next, we formalize our risk analysis model and the security requirements as a constraint satisfaction problem using the satisfiability modulo theories (SMT). A solution to the problem synthesizes necessary firewall policies and host placements. We also evaluate the scalability of the proposed risk analysis technique as well as the synthesis model.
机译:风险分析是执行和加强高效有效的安全性的重要过程。由于Internet,应用程序服务和相关的安全攻击的迅猛发展,信息专业人员在评估其网络风险方面面临挑战。风险评估可能会因企业要求而异。因此,通用的风险分析技术是合适的。而且,用正确的安全策略配置网络是一个难题。风险评估有助于实现必要的安全策略。风险是安全威胁和影响的函数。安全威胁取决于流量的可达性。诸如防火墙之类的安全设备用于选择性地允许或拒绝流量。但是,网络风险和安全策略之间的联系并不容易建立。在网络拓扑或安全策略中进行少量修改会大大改变风险。很难手动遵循系统的过程来配置网络以增强安全性。因此,自动生成适当的安全控制(例如,防火墙规则和网络拓扑中的主机放置)对于保持较低的总体安全风险至关重要。在本文中,我们首先提出用于定性风险分析的声明性模型。我们考虑传递可及性,即考虑一台或多台中间主机的可及性,以便计算漏洞的暴露程度。接下来,我们使用可满足性模理论(SMT)将我们的风险分析模型和安全需求形式化为约束满足问题。该问题的解决方案综合了必要的防火墙策略和主机位置。我们还评估了所提出的风险分析技术以及综合模型的可扩展性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号