RESEARCH ON MODELING FOR NETWORK SECURITY POLICY CONFLICTION BASED ON NETWORK TOPOLOGY

被引:0
|
作者
Li, Liang [1 ]
Wu, Shizhou [1 ]
Huang, Lisheng [1 ]
Wang, Wenyong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
关键词
Network topology; Policy consistency; Conflict checking; Network modeling;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The consistency checking of network security policy is an important issue of network security field, but current studies lack of overall security strategy modeling and entire network checking. In order to check the consistency of policy in distributed network system, a security policy model is proposed based on network topology, which checks conflicts of security policies for all communication paths in the network. First, the model uniformly describes network devices, domains and links, abstracts the network topology as an undirected graph, and formats the ACL (Access Control List) rules into quintuples. Then, based on the undirected graph, the model searches all possible paths between all domains in the topology, and checks the quintuple consistency by using a classifying algorithm. The experiments in campus network demonstrate that this model can effectively detect the conflicts of policy globally in the distributed network and ensure the consistency of the network security policies.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [21] Research on Network Security of Campus Network
    Huang, Min
    Luo, Wanbo
    Wan, Xing
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [22] NETWORK TOPOLOGY OPTIMIZATION WITH SECURITY CONSTRAINTS
    BACHER, R
    GLAVITSCH, H
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1986, 1 (04) : 103 - 111
  • [23] Network modeling and topology of aging
    Feng, Li
    Yang, Dengcheng
    Wu, Sinan
    Xue, Chengwen
    Sang, Mengmeng
    Liu, Xiang
    Che, Jincan
    Wu, Jie
    Gragnoli, Claudia
    Griffin, Christopher
    Wang, Chen
    Yau, Shing-Tung
    Wu, Rongling
    PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2025, 1101 : 1 - 65
  • [24] Research on the design of network security situation sensor based on network traffic
    Yue, Peng
    Zhao, Limin
    Boletin Tecnico/Technical Bulletin, 2017, 55 (07): : 554 - 561
  • [25] Research on Computer Network Security Technology Based on the BP Neural Network
    He, Xiaochun
    Kan, Ping
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 581 - 584
  • [26] The Research of the Network Security Situation Prediction mechanism Based on the complex network
    Sun, Shouxin
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1183 - 1187
  • [27] Research of computer network security evaluation based on RBF neural network
    Zhang, Yan-ling
    Xiong, Jian-liang
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 122 - 126
  • [28] Research on UAV Communication Network Topology Based on Small World Network Model
    Li Jingnan
    Li Pengfei
    Liu Kai
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), 2017, : 444 - 447
  • [29] The Research of Network Security Based on Cognitive Radio
    Mu, Ruihui
    Li, Junwei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 193 - 203
  • [30] Security extension to grasshopper for network management based policy
    Yang, B
    Liu, DY
    Yang, K
    Yu, WJ
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 10 - 15