Automatic management of network security policy

被引:0
|
作者
Burns, J
Cheng, A
Gurung, P
Rajagopalan, S
Rao, P
Rosenbluth, D
Surendran, AV
Martin, DM
机构
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes work in our project funded by DARPA Dynamic Coalitions program to design, develop, and demonstrate a system for automatically managing security policies in dynamic networks.. Specifically, we aim to reduce human involvement in network management by building a practical network reconfiguration system so that simple security policies stated as positive and negative invariants are upheld as the network changes. The focus of this project is a practical tool to help systems administrators verifiably enforce simple multi-layer network security policies. Our key design considerations are computational cost of policy validation and the power of the enforcement primitives. The central component is a policy engine populated by models of network elements and services that validates policies and computes new configuration settings for network elements when they are violated We instantiate our policy enforcement tool using a monitoring and instrumentation layer that reports network changes as they occur and implements configuration changes computed by the policy engine.
引用
收藏
页码:12 / 26
页数:15
相关论文
共 50 条
  • [41] ASPGen: an Automatic Security Policy Generating Framework for AppArmor
    Li, Yun
    Huang, Chenlin
    Yuan, Lu
    Ding, Yan
    Cheng, Hua
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 392 - 400
  • [42] Security management in personal network
    Zhang, Dajiang
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 575 - 578
  • [43] Network Security Infrastructure Management
    Rojanakul, Kittichote
    Liang, Hu
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 412 - 415
  • [44] Network Security and Management in SDN
    Cai, Zhiping
    Hu, Chengchen
    Zheng, Kai
    Xu, Yang
    Fu, Qiang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [45] SECURITY REQUIREMENTS FOR NETWORK MANAGEMENT
    SHIREY, RW
    COMPUTER STANDARDS & INTERFACES, 1995, 17 (04) : 321 - 331
  • [46] Security policy management for handheld devices
    Jansen, WA
    Karygiannis, T
    Iorga, M
    Gavrila, S
    Korolev, V
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 199 - 204
  • [47] Security policy management in the Internet age
    Woodward, Darrell
    Software World, 2000, 31 (03):
  • [48] A usability study of security policy management
    Herzog, Almut
    Shahmehri, Nahid
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 296 - +
  • [49] Policy framework for security and privacy management
    Karat, J.
    Karat, C. -M.
    Bertino, E.
    Li, N.
    Ni, Q.
    Brodie, C.
    Lobo, J.
    Calo, S. B.
    Cranor, L. F.
    Kumaraguru, P.
    Reeder, R. W.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [50] Security Policy Compliance with Violation Management
    Brunel, Julien
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Sans, Thierry
    Bodeveix, Jean-Paul
    FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, 2007, : 31 - 40