RESEARCH ON MODELING FOR NETWORK SECURITY POLICY CONFLICTION BASED ON NETWORK TOPOLOGY

被引:0
|
作者
Li, Liang [1 ]
Wu, Shizhou [1 ]
Huang, Lisheng [1 ]
Wang, Wenyong [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
关键词
Network topology; Policy consistency; Conflict checking; Network modeling;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The consistency checking of network security policy is an important issue of network security field, but current studies lack of overall security strategy modeling and entire network checking. In order to check the consistency of policy in distributed network system, a security policy model is proposed based on network topology, which checks conflicts of security policies for all communication paths in the network. First, the model uniformly describes network devices, domains and links, abstracts the network topology as an undirected graph, and formats the ACL (Access Control List) rules into quintuples. Then, based on the undirected graph, the model searches all possible paths between all domains in the topology, and checks the quintuple consistency by using a classifying algorithm. The experiments in campus network demonstrate that this model can effectively detect the conflicts of policy globally in the distributed network and ensure the consistency of the network security policies.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [41] A Novel Network Topology Sensing Method for Network Security Situation Awareness
    Wang, Yixuan
    Zhao, Bo
    Sun, Zhonghao
    Huo, Zhihui
    Li, Xueying
    Wu, Yabiao
    Li, Jiao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT IV, 2024, 14490 : 82 - 101
  • [42] RESEARCH ON TOPOLOGY OF DATA TRANSMISSION NETWORK BASED ON VEHICLE SELF-ORGANISING NETWORK
    Luo Yong
    Li Tuan
    Zhang Wenke
    Luo Wei
    JOURNAL OF ENVIRONMENTAL PROTECTION AND ECOLOGY, 2020, 21 (03): : 1028 - 1036
  • [43] Research on computer network security evaluation based on image recognition and neural network
    Wang, Zilong
    Shi, Lin
    Chen, Ning
    Chen, Jie
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (01)
  • [44] Design of a LDAP schema based on network security policy information model for storing security policy
    Kim, G
    Na, JC
    Sohn, S
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
  • [45] Research on the network security supervision practical guide mode based on network resource
    Luo, Gaofeng
    Huang, Tongcheng
    Shi, Zijuan
    Information Technology Journal, 2013, 12 (23) : 7193 - 7200
  • [46] A Virtual Network Topology Security Assessment Process
    Goyette, R.
    Karmouch, A.
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 974 - 979
  • [47] Checkmate network security modeling
    Apostal, D
    Foote-Lennox, T
    Markham, T
    Dowd, A
    Lu, R
    O'Brien, D
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 214 - 226
  • [48] Research on Network Security Collaborative Defense Technology Based on Swarm Intelligence and Big Data Network Security
    Bingjie, Yu
    Huifeng, Yang
    Chenjun, Sun
    Zhi, Zhang
    Jinghang, Fan
    Engineering Intelligent Systems, 2021, 29 (06): : 379 - 386
  • [49] International migration network: Topology and modeling
    Fagiolo, Giorgio
    Mastrorillo, Marina
    PHYSICAL REVIEW E, 2013, 88 (01)
  • [50] Research of Security Identity Authentication Based on Campus Network
    Guo Zhenghui
    Han Xiujuan
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 333 - 335