A Verification framework for Analyzing Security Implementations in an Enterprise LAN

被引:3
|
作者
Bera, P. [1 ]
Dasgupta, Pallab [2 ]
Ghosh, S. K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
D O I
10.1109/IADCC.2009.4809153
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a typical local area network (LAN), the global security policies, often defined in abstract form, are implemented through a set of access control rules (ACL) placed in a distributed fashion to the access switches of its sub-networks. Proper Enforcement of the global security policies of the network demands well-defined policy specification as a whole as well as correct implementation of the policies in various interfaces. But, ensuring correctness of the implementation manually is hard due to the complex security policies and presence of hidden access paths in the network. This paper presents a formal verification framework to verify the security implementations in a LAN with respect to a defined security policy. The proposed framework stems from formal models of network security policy specifications, device-specific security implementations, and deploys verification supported by SAT based procedures. The novelty of the work lies in the analysis of the hidden access paths, which plays a significant role in correct security implementations.
引用
收藏
页码:1008 / +
页数:2
相关论文
共 50 条
  • [31] A System Framework of Security Management in Enterprise Systems
    Wang, Feng
    Ge, Baoshan
    Zhang, Li
    Chen, Yong
    Xin, Yang
    Li, Xiayuan
    SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE, 2013, 30 (03) : 287 - 299
  • [32] Cooperative ITS Security Framework: Standards and Implementations Progress in Europe
    Lonc, Brigitte
    Cincilla, Pierpaolo
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,
  • [33] A framework for analyzing e-commerce security
    Kesh, Someswar
    Ramanujan, Sam
    Nerur, Sridhar
    Information Management and Computer Security, 2002, 10 (04): : 149 - 158
  • [34] Development of an Integrated Security Framework to Enable the Control and Security of a Heterogeneous Enterprise
    Farroha, B.
    Essman, K.
    Farroha, D.
    Cohan, A.
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 103 - 108
  • [35] Security verification framework for NDN access control
    Fei, Yuan
    Yin, Jiaqi
    Yan, Lijun
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [36] PCH Framework for IP Runtime Security Verification
    Guo, Xiaolong
    Dutta, Raj Gautam
    He, Jiaji
    Jin, Yier
    PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 79 - 84
  • [37] Impact of Enterprise System Implementations on Enterprise Risk
    Parra, Fernando
    Hall, Laura L.
    Gemoets, Leopoldo
    Mahmood, M. Adam
    AMCIS 2015 PROCEEDINGS, 2015,
  • [38] A Query Driven Security Testing Framework for Enterprise Network
    Bera, Padmalochan
    Ghosh, Soumya Kanti
    IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2013), 2013, : 476 - 483
  • [39] Enterprise Systems Security Management: a Framework for Breakthrough Protection
    Farroha, Bassam S.
    Farroha, Deborah L.
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2010, 2010, 7707
  • [40] A Security Assurance Framework Combining Formal Verification and Security Functional Testing
    Wang, Weiguang
    Zeng, Qingkai
    Mathur, Aditya P.
    2012 12TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC), 2012, : 136 - 139