首页> 外文会议>International Conference on Risks and Security of Internet and Systems >Inter-technology Conflict Analysis for Communication Protection Policies
【24h】

Inter-technology Conflict Analysis for Communication Protection Policies

机译:通信保护策略的技术间冲突分析

获取原文

摘要

Usually network administrators implement a protection policy by refining a set of (abstract) communication security requirements into configuration settings for the security controls that will provide the required protection. The refinement consists in evaluating the available technologies that can enforce the policy at node and network level, selecting the most suitable ones, and possibly making fine adjustments, like aggregating several individual channels into a single tunnel. The refinement process is a sensitive task which can lead to incorrect or subop-timal implementations, that in turn affect the overall security, decrease the network throughput and increase the maintenance costs. In literature, several techniques exist that can be used to identify anomalies (i.e. potential incompatibilities and redundancies among policy implementations. However, these techniques usually focus only on a single security technology (e.g. IPsec) and overlook the effects of multiple overlapping protection techniques. This paper presents a novel classification of communication protection policy anomalies and a formal model which is able to detect anomalies among policy implementations relying on technologies that work at different network layers. The result of our analysis allows administrators to have a precise insight on the various alternative implementations, their relations and the possibility of resolving anomalies, thus increasing the overall security and performance of a network.
机译:通常,网络管理员通过将一组(抽象的)通信安全要求细化为将提供所需保护的安全控制的配置设置,来实施保护策略。改进之处在于评估可以在节点和网络级别实施策略的可用技术,选择最合适的技术,并可能进行细微调整,例如将几个单独的通道聚合到单个隧道中。优化过程是一项敏感的任务,可能导致错误或次理想的实施,进而影响整体安全性,降低网络吞吐量并增加维护成本。在文献中,存在几种可用于识别异常的技术(即,策略实施之间可能存在的不兼容性和冗余性。)但是,这些技术通常仅专注于单个安全技术(例如IPsec),而忽略了多种重叠保护技术的影响。这篇论文提出了一种新的通信保护策略异常分类和一个正式模型,该模型能够检测依赖于在不同网络层工作的技术的策略实施中的异常,我们的分析结果使管理员可以对各种替代实施有一个准确的了解。 ,它们之间的关系以及解决异常的可能性,从而提高了网络的整体安全性和性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号