Automatic management of network security policy

被引:0
|
作者
Burns, J
Cheng, A
Gurung, P
Rajagopalan, S
Rao, P
Rosenbluth, D
Surendran, AV
Martin, DM
机构
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes work in our project funded by DARPA Dynamic Coalitions program to design, develop, and demonstrate a system for automatically managing security policies in dynamic networks.. Specifically, we aim to reduce human involvement in network management by building a practical network reconfiguration system so that simple security policies stated as positive and negative invariants are upheld as the network changes. The focus of this project is a practical tool to help systems administrators verifiably enforce simple multi-layer network security policies. Our key design considerations are computational cost of policy validation and the power of the enforcement primitives. The central component is a policy engine populated by models of network elements and services that validates policies and computes new configuration settings for network elements when they are violated We instantiate our policy enforcement tool using a monitoring and instrumentation layer that reports network changes as they occur and implements configuration changes computed by the policy engine.
引用
收藏
页码:12 / 26
页数:15
相关论文
共 50 条
  • [21] NETWORK SECURITY POLICY MODELS
    VARADHARAJAN, V
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 74 - 95
  • [22] A network security policy self-adaptive management and distribution model in complex network environment
    Tang, Chenghua
    Yu, Shunzheng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 832 - 837
  • [23] Automatic Analysis Method for SELinux Security Policy
    Zhai, Gaoshou
    Wu, Tong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 229 - 234
  • [24] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [25] Algorithms for Automatic Analysis of SELinux Security Policy
    Zhai, Gaoshou
    Wu, Tong
    Bai, Jing
    Guo, Tao
    Li, Tianyou
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 71 - 83
  • [26] Security and management policy specification
    Sloman, M
    Lupu, E
    IEEE NETWORK, 2002, 16 (02): : 10 - 19
  • [27] Policy Research of Network Security about Employment Management System in Colleges and Universities
    Luo Lin
    FRONTIERS OF GREEN BUILDING, MATERIALS AND CIVIL ENGINEERING, PTS 1-8, 2011, 71-78 : 4353 - 4356
  • [28] Automatic Security Management of Computer Systems
    Zegzhda, P. D.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 665 - 672
  • [29] Assessment of Network Security Policy Based on Security Capability
    Tang, Chenghua
    Yu, Shunzheng
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
  • [30] Security policy decision for automation of security network configuration
    Ahn, G
    Yoon, SY
    Kim, KY
    Jang, JS
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1057 - 1061