RESEARCH ON MODELING FOR NETWORK SECURITY POLICY CONFLICTION BASED ON NETWORK TOPOLOGY

被引:0
|
作者
Li, Liang [1 ]
Wu, Shizhou [1 ]
Huang, Lisheng [1 ]
Wang, Wenyong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
关键词
Network topology; Policy consistency; Conflict checking; Network modeling;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The consistency checking of network security policy is an important issue of network security field, but current studies lack of overall security strategy modeling and entire network checking. In order to check the consistency of policy in distributed network system, a security policy model is proposed based on network topology, which checks conflicts of security policies for all communication paths in the network. First, the model uniformly describes network devices, domains and links, abstracts the network topology as an undirected graph, and formats the ACL (Access Control List) rules into quintuples. Then, based on the undirected graph, the model searches all possible paths between all domains in the topology, and checks the quintuple consistency by using a classifying algorithm. The experiments in campus network demonstrate that this model can effectively detect the conflicts of policy globally in the distributed network and ensure the consistency of the network security policies.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [2] Research and Analysis on Network Security Modeling
    Cao, Kehao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 135 - 142
  • [3] Policy modeling and refinement for network security systems
    de Albuquerque, JP
    Krumm, H
    de Geus, PL
    SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 24 - 33
  • [4] Research on Modification and Optimization of Network Topology and Internet Security based on Neural Network Structure and Mathematical Optimization
    Zhao, Gaoli
    Song, Junping
    Chen, Wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 1 - 12
  • [5] Research on Network Security Protection System based on Dynamic Modeling
    Shu, Fei
    Li, Ming
    Chen, ShuTing
    Wang, Xu
    Li, Feng
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1602 - 1605
  • [6] Research on Tactical communication network Topology Modeling and Topology optimization
    Gan, Zhi-chun
    Li, Jing-jing
    Shen, Jian-jun
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 2, 2011, : 438 - 441
  • [7] Modeling Wireless Network Topology Based on the Theory of Complex Network
    Jiang, Zhiyong
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2892 - 2896
  • [8] Assessment of Network Security Policy Based on Security Capability
    Tang, Chenghua
    Yu, Shunzheng
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
  • [10] Research on Network Security Based on IPSec
    Liu, Yanru
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 150 - 154