Model-Driven Extraction and Analysis of Network Security Policies

被引:0
|
作者
Martinez, Salvador [1 ]
Garcia-Alfaro, Joaquin
Cuppens, Frederic
Cuppens-Boulahia, Nora
Cabot, Jordi [1 ]
机构
[1] LINA, INRIA, Ecole Mines Nantes, AtlanMod, Nantes, France
关键词
ACCESS-CONTROL;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy being enforced by a network system is a critical information. Otherwise, we risk to hamper the proper evolution of the system and compromise its security. Unfortunately, discovering such enforced policy is an error-prone and time consuming task that requires low-level and, often, vendor-specific expertise since firewalls may be configured using different languages and conform to a complex network topology. To tackle this problem, we propose a model-driven reverse engineering approach able to extract the security policy implemented by a set of firewalls in a working network, easing the understanding, analysis and evolution of network security policies.
引用
收藏
页码:52 / 68
页数:17
相关论文
共 50 条
  • [1] MODEL-DRIVEN ENGINEERING OF FUNCTIONAL SECURITY POLICIES
    Jiague, Michel Embe
    Frappier, Marc
    Gervais, Frederic
    Konopacki, Pierre
    Laleau, Regine
    Milhau, Jeremy
    St-Denis, Richard
    [J]. ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 3: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2010, : 374 - 379
  • [2] A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
    Arzapalo, Denisse Munante
    Chiprianov, Vanea
    Gallon, Laurent
    Aniorte, Philippe
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 150 - 169
  • [3] Model-driven architecture based security analysis
    Mili, Saoussen
    Nguyen, Nga
    Chelouah, Rachid
    [J]. SYSTEMS ENGINEERING, 2021, 24 (05) : 307 - 321
  • [4] Advances in Model-Driven Security
    Lucio, Levi
    Zhang, Qin
    Nguyen, Phu H.
    Amrani, Moussa
    Klein, Jacques
    Vangheluwe, Hans
    Le Traon, Yves
    [J]. ADVANCES IN COMPUTERS, VOL 93, 2014, 93 : 103 - 152
  • [5] A Model-driven Approach to Service Policies
    Jegadeesan, Harshavardhan
    Balasubramaniam, Sundar
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2009, 8 (02): : 163 - 186
  • [6] Model-Driven Configuration of SELinux Policies
    Agreiter, Berthold
    Breu, Ruth
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 2, 2009, 5871 : 887 - 904
  • [7] A Model-Driven Approach for the Specification and Analysis of Access Control Policies
    Massacci, Fabio
    Zannone, Nicola
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1087 - +
  • [8] A Systematic Review of Model-Driven Security
    Nguyen, Phu H.
    Klein, Jacques
    Le Traon, Yves
    Kramer, Max E.
    [J]. 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 432 - 441
  • [9] MODEL-DRIVEN SECURITY FOR TRUSTED SYSTEMS
    Alam, Masoom
    Khan, Shahbaz
    Alam, Quratulain
    Ali, Tamleek
    Anwar, Sajid
    Hayat, Amir
    Jaffar, Arfan
    Ali, Muhammad
    Adnan, Awais
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (02): : 1221 - 1235
  • [10] Model-Driven Security Analysis of Self-Sovereign Identity Systems
    Ding, Yepeng
    Sato, Hiroyuki
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1687 - 1694