Automatic management of network security policy

被引:0
|
作者
Burns, J
Cheng, A
Gurung, P
Rajagopalan, S
Rao, P
Rosenbluth, D
Surendran, AV
Martin, DM
机构
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes work in our project funded by DARPA Dynamic Coalitions program to design, develop, and demonstrate a system for automatically managing security policies in dynamic networks.. Specifically, we aim to reduce human involvement in network management by building a practical network reconfiguration system so that simple security policies stated as positive and negative invariants are upheld as the network changes. The focus of this project is a practical tool to help systems administrators verifiably enforce simple multi-layer network security policies. Our key design considerations are computational cost of policy validation and the power of the enforcement primitives. The central component is a policy engine populated by models of network elements and services that validates policies and computes new configuration settings for network elements when they are violated We instantiate our policy enforcement tool using a monitoring and instrumentation layer that reports network changes as they occur and implements configuration changes computed by the policy engine.
引用
收藏
页码:12 / 26
页数:15
相关论文
共 50 条
  • [32] A model transformation based security policy automatic management framework for software-defined networking
    Meng, Yunfei
    Ke, Changbo
    Huang, Zhiqiu
    COMPUTERS & SECURITY, 2024, 142
  • [33] NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY*
    Choi, Jay Pil
    Fershtman, Chaim
    Gandal, Neil
    JOURNAL OF INDUSTRIAL ECONOMICS, 2010, 58 (04): : 868 - 894
  • [34] How to create a network security policy
    Simonds, F
    BYTE, 1996, 21 (08): : 36 - 36
  • [35] Transparent network security policy enforcement
    Keromytis, AD
    Wright, JL
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2000, : 215 - 225
  • [36] Security policy specification for home network
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Wook
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (06) : 372 - 378
  • [37] Security policy for personal network terminal
    Yoshii, D
    Ikeda, T
    Morijiri, T
    Saisho, T
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 356 - 361
  • [38] Security Engine Management of Router based on Security Policy
    Jo, Su Hyung
    Kim, Ki Young
    Lee, Sang Ho
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 116 - 119
  • [39] Network Security's security management tool
    不详
    COMPUTER, 1999, 32 (11) : 121 - 122
  • [40] Automatic Network Reconfiguration because of Security Events
    Silva Delgado, Juan Sebastian
    Mendez Penuela, David Javier
    Morales Medina, Laura Victoria
    Rueda Rodriguez, Sandra Julieta
    2014 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2014,