RESEARCH ON MODELING FOR NETWORK SECURITY POLICY CONFLICTION BASED ON NETWORK TOPOLOGY

被引:0
|
作者
Li, Liang [1 ]
Wu, Shizhou [1 ]
Huang, Lisheng [1 ]
Wang, Wenyong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
关键词
Network topology; Policy consistency; Conflict checking; Network modeling;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The consistency checking of network security policy is an important issue of network security field, but current studies lack of overall security strategy modeling and entire network checking. In order to check the consistency of policy in distributed network system, a security policy model is proposed based on network topology, which checks conflicts of security policies for all communication paths in the network. First, the model uniformly describes network devices, domains and links, abstracts the network topology as an undirected graph, and formats the ACL (Access Control List) rules into quintuples. Then, based on the undirected graph, the model searches all possible paths between all domains in the topology, and checks the quintuple consistency by using a classifying algorithm. The experiments in campus network demonstrate that this model can effectively detect the conflicts of policy globally in the distributed network and ensure the consistency of the network security policies.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [31] Network security: Locking in to policy
    Sable Technology Corp, Boston, United States
    Data Commun, 4 (77-80):
  • [32] NETWORK SECURITY POLICY MODELS
    VARADHARAJAN, V
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 74 - 95
  • [33] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [34] An Automata-based Security Policy Translation for Network Security Functions
    Yang, Jinhyuk
    Jeong, Jaehoon
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 268 - 272
  • [35] Network Topology Measurements Research Based on Campus Networks
    Qu, Hui-jie
    Huang, Yan
    Zhao, Dan
    Zhao, Zhi
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (ICCSE 2017), 2017, 81 : 91 - 98
  • [36] Research on Focused Crawler Based upon Network Topology
    Xiong, Fei
    Liu, Yun
    Li, Yong
    JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (05): : 377 - 380
  • [37] Research of mobile agent based network topology discovery
    Dong, Chao
    Cheng, Xiao-rong
    Zhang, Ming-quan
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 733 - +
  • [38] Modeling of policy-based network with SVDB
    Lee, WY
    Seo, HS
    Cho, TH
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 323 - 332
  • [39] Research on modeling method of power system network security risk assessment based on object-oriented Bayesian network
    Dong Yueli
    Sun Bin
    Wang Gang
    ENERGY REPORTS, 2021, 7 : 289 - 295
  • [40] Research on Network Security Risk Modeling and Quantitative Analysis Theory
    Zhao, Xiao-Lin
    Yang, Yi-Ning
    Li, Xu-Hui
    Jiang, Feng
    Zhang, Ji
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS (WCNA2017), 2017, : 99 - 104