A Verification framework for Analyzing Security Implementations in an Enterprise LAN

被引:3
|
作者
Bera, P. [1 ]
Dasgupta, Pallab [2 ]
Ghosh, S. K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
D O I
10.1109/IADCC.2009.4809153
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a typical local area network (LAN), the global security policies, often defined in abstract form, are implemented through a set of access control rules (ACL) placed in a distributed fashion to the access switches of its sub-networks. Proper Enforcement of the global security policies of the network demands well-defined policy specification as a whole as well as correct implementation of the policies in various interfaces. But, ensuring correctness of the implementation manually is hard due to the complex security policies and presence of hidden access paths in the network. This paper presents a formal verification framework to verify the security implementations in a LAN with respect to a defined security policy. The proposed framework stems from formal models of network security policy specifications, device-specific security implementations, and deploys verification supported by SAT based procedures. The novelty of the work lies in the analysis of the hidden access paths, which plays a significant role in correct security implementations.
引用
收藏
页码:1008 / +
页数:2
相关论文
共 50 条
  • [21] A Modeling and Verification Framework for Security Protocols
    Lilli, Mario
    RIGOROUS STATE-BASED METHODS, ABZ 2021, 2021, 12709 : 158 - 161
  • [22] A Verification Framework for Stateful Security Protocols
    Li, Li
    Dong, Naipeng
    Pang, Jun
    Sun, Jun
    Bai, Guangdong
    Liu, Yang
    Dong, Jin Song
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 262 - 280
  • [23] A framework for compositional verification of security protocols
    Andova, Suzana
    Cremers, Cas
    Gjosteen, Kristian
    Mauw, Sjouke
    Mjolsnes, Stig F.
    Radomirovic, Saga
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 425 - 459
  • [24] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Computing Department, Open University, United Kingdom
    Electron. Notes Theor. Comput. Sci., 1 (123-136):
  • [25] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Jurjens, Jan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 250 (01) : 123 - 136
  • [26] AN ENTERPRISE PRINTER FOR THE LAN
    KREPCHIN, I
    DATAMATION, 1993, 39 (03): : 69 - +
  • [27] Enterprise Information Systems Security: A Conceptual Framework
    Chaudhry, Peggy E.
    Chaudhry, Sohail S.
    Reese, Ronald
    Jones, Darryl S.
    RE-CONCEPTUALIZING ENTERPRISE INFORMATION SYSTEMS, 2012, 105 : 118 - +
  • [28] A Security Risk Assessment Framework for the Enterprise Intranet
    Lou, Fang
    Tian, Zhi-hong
    Fu, Yun-sheng
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION (ICEEA 2016), 2016,
  • [29] Protection of Enterprise Resources: A Novel Security Framework
    Ullah, Ikram
    Shah, Munam Ali
    Wahid, Abdul
    Waheed, Abdul
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 98 - 103
  • [30] Information assurance security framework for enterprise networks
    Kesari, MD
    Velayutham, T
    Sudarsan, SD
    Jagadhane, M
    Sailaja, U
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 180 - 184