Management of security policy configuration using a Semantic Threat Graph approach

被引:7
|
作者
Foley, Simon [1 ]
Fitzgerald, William [1 ]
机构
[1] Univ Coll Cork, Dept Comp Sci, Cork Constraint Computat Ctr, Cork, Ireland
基金
爱尔兰科学基金会;
关键词
Ontology; threat tree; firewall; security compliance;
D O I
10.3233/JCS-2011-0421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management based approach, whereby knowledge about the effectiveness of mitigating countermeasures is used to guide the autonomic configuration of security mechanisms. This knowledge is modeled in terms of Semantic Threat Graphs, a variation of the traditional Threat/Attack Tree, extended in order to relate semantic information about security configuration with threats, vulnerabilities and countermeasures. An ontology-based approach to representing and reasoning over this knowledge is taken. A case study based on Network Access Controls demonstrates how threats can be analysed and how automated configuration recommendations can be made based on catalogues of countermeasures. These countermeasures are drawn from best-practice standards, including NIST, IETF and PCI-DSS recommendations for firewall configuration.
引用
收藏
页码:567 / 605
页数:39
相关论文
共 50 条
  • [1] An Approach to Security Policy Configuration Using Semantic Threat Graphs
    Foley, Simon N.
    Fitzgerald, William M.
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 33 - 48
  • [2] Network security assessment using a semantic reasoning and graph based approach
    Wu, Songyang
    Zhang, Yong
    Cao, Wei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 96 - 109
  • [3] A PRACTICAL APPROACH TO SEMANTIC CONFIGURATION MANAGEMENT
    MORICONI, M
    [J]. PROCEEDINGS OF THE ACM SIGSOFT 89: THIRD SYMPOSIUM ON SOFTWARE TESTING, ANALYSIS, AND VERIFICATION ( TAV 3 ), 1989, 14 : 103 - 113
  • [4] A novel approach for security function graph configuration and deployment
    Bringhenti, Daniele
    Marchetto, Guido
    Sisto, Riccardo
    Valenza, Fulvio
    [J]. PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 457 - 463
  • [5] A policy based approach to security for the Semantic Web
    Kagal, L
    Finin, T
    Joshi, A
    [J]. SEMANTIC WEB - ISWC 2003, 2003, 2870 : 402 - 418
  • [6] Threat-Oriented Security Framework: A Proactive Approach in Threat Management
    Gandotra, Vandana
    Singhal, Archana
    Bedi, Punam
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 487 - 494
  • [7] A webometric approach to policy analysis and management using exponential random graph models
    Jung, Kyujin
    Park, Se Jung
    Wu, Wei-Ning
    Park, Han Woo
    [J]. QUALITY & QUANTITY, 2015, 49 (02) : 581 - 598
  • [8] A webometric approach to policy analysis and management using exponential random graph models
    Kyujin Jung
    Se Jung Park
    Wei-Ning Wu
    Han Woo Park
    [J]. Quality & Quantity, 2015, 49 : 581 - 598
  • [9] Configuration Management and Security
    Bellovin, Steven M.
    Bush, Randy
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (03) : 268 - 274
  • [10] A Semantic Approach for Cyber Threat Prediction Using Machine Learning
    Goyal, Yojana
    Sharma, Anand
    [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 435 - 438