A Verification framework for Analyzing Security Implementations in an Enterprise LAN

被引:3
|
作者
Bera, P. [1 ]
Dasgupta, Pallab [2 ]
Ghosh, S. K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
D O I
10.1109/IADCC.2009.4809153
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a typical local area network (LAN), the global security policies, often defined in abstract form, are implemented through a set of access control rules (ACL) placed in a distributed fashion to the access switches of its sub-networks. Proper Enforcement of the global security policies of the network demands well-defined policy specification as a whole as well as correct implementation of the policies in various interfaces. But, ensuring correctness of the implementation manually is hard due to the complex security policies and presence of hidden access paths in the network. This paper presents a formal verification framework to verify the security implementations in a LAN with respect to a defined security policy. The proposed framework stems from formal models of network security policy specifications, device-specific security implementations, and deploys verification supported by SAT based procedures. The novelty of the work lies in the analysis of the hidden access paths, which plays a significant role in correct security implementations.
引用
收藏
页码:1008 / +
页数:2
相关论文
共 50 条
  • [1] Formal Verification of Security Policy Implementations in Enterprise Networks
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
  • [2] Security implementations in the healthcare enterprise
    Brill, R
    Leetz, W
    CARS 2005: Computer Assisted Radiology and Surgery, 2005, 1281 : 290 - 295
  • [3] Slede: Framework for Automatic Verification of Sensor Network Security Protocol Implementations
    Hanna, Youssef
    Rajan, Hridesh
    2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 427 - 428
  • [4] Slede: A Domain-Specific Verification Framework for Sensor Network Security Protocol Implementations
    Hanna, Youssef
    Rajan, Hridesh
    Zhang, Wensheng
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 109 - 118
  • [5] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [6] A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model
    Bera, P.
    Maity, Soumya
    Ghosh, S. K.
    Dasgupta, Pallab
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 232 - +
  • [7] Wireless LAN Security Mechanisms at the Enterprise and Home Level
    Crainicu, Bogdan
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 305 - 310
  • [8] Fault Analysis of Security Policy Implementations in Enterprise Networks
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 240 - +
  • [9] Q: A Sound Verification Framework for Statecharts and Their Implementations
    Pollard, Samuel D.
    Armstrong, Robert C.
    Bender, John
    Hulette, Geoffrey C.
    Mahmood, Raheel S.
    Morris, Karla
    Rawlings, Blake C.
    Aytac, Jon M.
    PROCEEDINGS OF THE 8TH ACM SIGPLAN INTERNATIONAL WORKSHOP ON FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS, FTSCS 2022, 2022, : 16 - 26
  • [10] A Generic Methodology for the Modular Verification of Security Protocol Implementations
    Arquint, Linard
    Schwerhoff, Malte
    Mehta, Vaibhav
    Mueller, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1377 - 1391