Automatic management of network security policy

被引:0
|
作者
Burns, J
Cheng, A
Gurung, P
Rajagopalan, S
Rao, P
Rosenbluth, D
Surendran, AV
Martin, DM
机构
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes work in our project funded by DARPA Dynamic Coalitions program to design, develop, and demonstrate a system for automatically managing security policies in dynamic networks.. Specifically, we aim to reduce human involvement in network management by building a practical network reconfiguration system so that simple security policies stated as positive and negative invariants are upheld as the network changes. The focus of this project is a practical tool to help systems administrators verifiably enforce simple multi-layer network security policies. Our key design considerations are computational cost of policy validation and the power of the enforcement primitives. The central component is a policy engine populated by models of network elements and services that validates policies and computes new configuration settings for network elements when they are violated We instantiate our policy enforcement tool using a monitoring and instrumentation layer that reports network changes as they occur and implements configuration changes computed by the policy engine.
引用
收藏
页码:12 / 26
页数:15
相关论文
共 50 条
  • [1] Security policy management for healthcare system network
    Lee, K
    Jiang, Z
    Kim, S
    Kim, S
    HEALTHCOM 2005: 7TH INTERNATIONAL WORKSHOP ON ENTERPRISE NETWORKING AND COMPUTING IN HEALTHCARE INDUSTRY, PROCEEDINGS, 2005, : 289 - 292
  • [2] A survey on policy languages in network and security management
    Han, Weili
    Lei, Chang
    COMPUTER NETWORKS, 2012, 56 (01) : 477 - 489
  • [3] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [4] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [5] Research on Key Technologies of Network Security Management Policy
    Tang, Chenghua
    Yu, Shunzheng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12530 - 12533
  • [6] Security extension to grasshopper for network management based policy
    Yang, B
    Liu, DY
    Yang, K
    Yu, WJ
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 10 - 15
  • [7] Flexible automatic detection for security management of dispatching data network
    Xianrui Yang
    Yuming Liu
    Jiehong Wang
    Zhao Yao
    Yanping Zhou
    Shucun Fu
    Journal of Cloud Computing, 9
  • [8] Flexible automatic detection for security management of dispatching data network
    Yang, Xianrui
    Liu, Yuming
    Wang, Jiehong
    Yao, Zhao
    Zhou, Yanping
    Fu, Shucun
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [9] Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework
    Lingga, Patrick
    Kim, Jeonghyeon
    Bartolome, Jorge David Iranzo
    Jeong, Jaehoon
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 882 - 887
  • [10] Alert analysis using data mining for security policy server in policy based network security management
    Jeong, KJ
    Shin, MS
    Moon, HS
    Ryu, KH
    Kim, KY
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 219 - 225