2011 Conference on Network and Information Systems Security 2011
DOI: 10.1109/sar-ssi.2011.5931390
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Formal Data Flow Oriented Model for Network Security Policies Analysis

Abstract: Network security policy enforcement consists in configuring heterogeneous security mechanisms (IPsec gateways, ACLs on routers, stateful firewalls, proxies, etc) that are available in a given network environment. The complexity of this task resides in the number, the nature, and the interdependence of the mechanisms to consider. Although several researchers have proposed different analysis tools, achieving this task requires experienced and proficient security administrators who can handle all these parameters… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In [21] Niksefat and Sabaei improve the efficiency of the approach in [7] by eliminating the need of processing all the rules. Khoury et al [22] propose hierarchical colored Petri nets for specifying network data traffic and abstract functions for modelling IPsec mechanisms operations. Compared to these works, the present paper tackles a different problem, which is verifying that the modification of IPsec configuration after migration has been consistently performed.…”
Section: Ipsec Vpnmentioning
confidence: 99%
“…In [21] Niksefat and Sabaei improve the efficiency of the approach in [7] by eliminating the need of processing all the rules. Khoury et al [22] propose hierarchical colored Petri nets for specifying network data traffic and abstract functions for modelling IPsec mechanisms operations. Compared to these works, the present paper tackles a different problem, which is verifying that the modification of IPsec configuration after migration has been consistently performed.…”
Section: Ipsec Vpnmentioning
confidence: 99%
“…First, we briefly introduce our model of data flow and data flow treatment that were published in [17,18]. Then we define our model of configuration of devices that improves the one presented in [19].…”
Section: Modeling Security Based On Data Flowmentioning
confidence: 99%
“…In the basic model which was published in [18], a data flow is a contiguous set of bytes of variable size conveyed over a network. We had defined our core entities by:  is the set of possible attributes.…”
Section: A a Formal Data Flow-oriented Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…As part of the IREHDO2 research project, we conducted interviews of senior security requirements engineers that revealed network security architects are looking for a methodological approach to, at least, consolidate the network security architectures they propose. Indeed, the task of verifying and validating the network security requirements with regards to business security requirements is tedious and challenging [12]. How to ensure that the proposed network zoning is correct and cost-effective?…”
Section: Introductionmentioning
confidence: 99%