An Automata-based Security Policy Translation for Network Security Functions

被引:0
|
作者
Yang, Jinhyuk [1 ]
Jeong, Jaehoon [2 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Interact Sci, Seoul, South Korea
关键词
Policy Translation; Automata theory; Interface to Network Security Functions;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes the design of a security policy translator in Interface to Network Security Functions (I2NSF) framework. Also, this paper shows the benefits of designing security policy translations. I2NSF is an architecture for providing various Network Security Functions (NSFs) to users. I2NSF user should be able to use NSF even if user has no overall knowledge of NSFs. Generally, policies which are generated by I2NSF user contain abstract data because users do not consider the attributes of NSFs when creating policies. Therefore, the I2NSF framework requires a translator that automatically finds the NSFs which is required for policy when Security Controller receives a security policy from the user and translates it for selected NSFs. We satisfied the above requirements by modularizing the translator through Automata theory.
引用
收藏
页码:268 / 272
页数:5
相关论文
共 50 条
  • [1] Automata-Based Approach to Design and Analyze Security Policies
    Krombi, Wadie
    Erradi, Mohammed
    Khoumsi, Ahmed
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 306 - 313
  • [2] Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework
    Lingga, Patrick
    Kim, Jeonghyeon
    Bartolome, Jorge David Iranzo
    Jeong, Jaehoon
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 882 - 887
  • [3] SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services
    Lingga, Patrick
    Jeong, Jaehoon
    Yang, Jinhyuk
    Kim, Jeonghyeon
    [J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21 (06) : 5156 - 5169
  • [4] Assessment of Network Security Policy Based on Security Capability
    Tang, Chenghua
    Yu, Shunzheng
    [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
  • [5] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [6] Interface to Network Security Functions for Cloud-Based Security Services
    Hyun, Sangwon
    Kim, Jinyong
    Kim, Hyoungshick
    Jeong, Jaehoon
    Hares, Susan
    Dunbar, Linda
    Farrel, Adrian
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 171 - 178
  • [7] Security policy of network messages based on SOAP
    Zhang, Gong-Xuan
    Song, Bin
    Wang, Ping-Li
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (01): : 66 - 70
  • [8] Design of a LDAP schema based on network security policy information model for storing security policy
    Kim, G
    Na, JC
    Sohn, S
    [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
  • [9] CBSS: Cloud-Based Security System with Interface to Network Security Functions
    Jeong, Jaehoon
    Lingga, Patrick
    [J]. 2023 FOURTEENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK, ICMU, 2023,
  • [10] SDN-based Security Services using Interface to Network Security Functions
    Kim, Jinyong
    Firoozjaei, Mahdi Daghmehchi
    Jeong, Jaehoon
    Kim, Hyoungshick
    Park, Jung-Soo
    [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 526 - 529