• DocumentCode
    1605472
  • Title

    Validation of Security Solutions for Communication Networks: A Policy-Based Approach

  • Author

    Rekhis, Slim ; Bennour, Baha ; Boudriga, Noureddine

  • Author_Institution
    Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia
  • fYear
    2011
  • Firstpage
    115
  • Lastpage
    122
  • Abstract
    Typically, security solutions are defined to meet the requirements of security policies, and are configured to implement some of their rules. Approaches proposed so far in the literature to validate security solutions have merely taken interest to the need of: a) describing the security policy used to define and configure these solutions b) generating executable description of attack scenarios targeting the secured system and c) verifying whether the secured systems react as expected. In this paper we develop a logic-based approach for the modeling of security policies and solutions based on the concept of observations, and the generation of executable scenarios of attacks. This approach provides a unified formalism for the specification of security policies, security solutions, library of legitimate actions and attacks, and correctness rules in the form of predicates over executions. We propose a modeling of two types of security solutions, namely passive and active solutions. We develop a Model Checker to generate executable scenarios of attacks, verify the security state of the system, and test whether the solutions react as expected to security attacks. A case study is proposed to illustrate the proposal.
  • Keywords
    computer network security; active solutions; communication networks; logic-based approach; model checker; passive solutions; policy-based approach; security attacks; security solutions; Computational modeling; Cost accounting; Libraries; Monitoring; Proposals; Safety; Security; Security solutions modeling; executable scenarios; formal verification; security policy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Computing and Applications (NCA), 2011 10th IEEE International Symposium on
  • Conference_Location
    Cambridge, MA
  • Print_ISBN
    978-1-4577-1052-0
  • Electronic_ISBN
    978-0-7695-4489-2
  • Type

    conf

  • DOI
    10.1109/NCA.2011.23
  • Filename
    6038592