首页> 外文期刊>Networks, IET >Formal integrated network security analysis tool: formal query-based network security configuration analysis
【24h】

Formal integrated network security analysis tool: formal query-based network security configuration analysis

机译:正式的集成网络安全分析工具:基于正式查询的网络安全配置分析

获取原文
获取原文并翻译 | 示例
       

摘要

Owing to increasing complexity of network configurations with large topology and use of heterogeneous network services, enterprise networks deploy various security measures based on the organisational security policies. Typically, security policy represents the high level requirements for controlling the resource accesses by traffic source, destination, protocol, access time and so on. Security policies are implemented in the network devices (routers, firewalls and so on) in a distributed fashion through various access control lists (ACLs). The ACL configurations may contain different level of inconsistencies which may make the network vulnerable. In addition, there may exist inconsistent ‘hidden access paths’ in the implementation because of transitive access relationships between the network services. Further, the failure of network link(s) may form alternative routing paths that violate ACL. Manual analysis of this problem can be overwhelming and potentially inaccurate. In this study, a query-based formal security analysis tool has been presented that automates the process using Boolean satisfiability (SAT). The tool allows network administrators to systematically evaluate the distributed ACL configurations through various standard and complex service access queries. The tool evaluates the static access queries through SAT-based decision procedures, and the fault-based queries (under network link failures) through graph mining procedures.
机译:由于具有大拓扑的网络配置的复杂性不断增加以及使用异构网络服务,企业网络根据组织的安全策略部署了各种安全措施。通常,安全策略代表通过流量源,目的地,协议,访问时间等控制资源访问的高级要求。通过各种访问控制列表(ACL)以分布式方式在网络设备(路由器,防火墙等)中实现安全策略。 ACL配置可能包含不同级别的不一致,这可能会使网络容易受到攻击。此外,由于网络服务之间的传递访问关系,实施中可能存在不一致的“隐藏访问路径”。此外,网络链路的故障可能形成违反ACL的替代路由路径。手动分析此问题可能会令人不知所措,而且可能不准确。在这项研究中,已经提出了基于查询的形式安全分析工具,该工具使用布尔可满足性(SAT)使过程自动化。该工具允许网络管理员通过各种标准和复杂的服务访问查询来系统地评估分布式ACL配置。该工具通过基于SAT的决策程序评估静态访问查询,并通过图形挖掘程序评估基于故障的查询(在网络链接故障下)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号