• DocumentCode
    652906
  • Title

    A Formal Framework for Network Security Design Synthesis

  • Author

    Rahman, Md Arifur ; Al-Shaer, Ehab

  • Author_Institution
    Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
  • fYear
    2013
  • fDate
    8-11 July 2013
  • Firstpage
    560
  • Lastpage
    570
  • Abstract
    Due to the extensive use of Internet services and emerging security threats, most enterprise networks deploy varieties of security devices for controlling resource access based on organizational security requirements. These requirements are becoming more fine-grained, where access control depends on heterogeneous isolation patterns like access deny, trusted communication, and payload inspection. However, organizations are looking to design usable and optimal security configurations that can harden the network security within enterprise budget constraints. This requires analyzing various alternative security architectures in order to find a security design that satisfies the organizational security requirements as well as the business constraints. In this paper, we present ConfigSynth, an automated framework for synthesizing network security configurations by exploring various security design alternatives to provide an optimal solution. The main design alternatives include different kinds of isolation patterns for traffic flows in different segments of the network. ConfigSynth takes security requirements and business constraints along with the network topology as inputs. Then it synthesizes optimal and cost-effective security configurations satisfying the constraints. ConfigSynth also provides optimal placements of different security devices in the network according to the given network topology. ConfigSynth uses Satisfiability Modulo Theories (SMT) for modeling this synthesis problem. We demonstrate the scalability of the tool using simulated experiments.
  • Keywords
    Internet; authorisation; business data processing; computability; computer network security; telecommunication network topology; telecommunication traffic; ConfigSynth; Internet services; SMT; access deny; alternative security architectures; business constraints; enterprise budget constraints; enterprise networks; formal framework; heterogeneous isolation patterns; network security configuration synthesis; network security design synthesis; network topology; optimal security configurations; organizational security requirements; payload inspection; resource access control; satisfiability modulo theories; security threats; synthesis problem modeling; traffic flows; trusted communication; Business; Equations; Mathematical model; Network topology; Payloads; Security; Usability; automatic synthesis; constraints; formal logic; security configuration;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on
  • Conference_Location
    Philadelphia, PA
  • ISSN
    1063-6927
  • Type

    conf

  • DOI
    10.1109/ICDCS.2013.70
  • Filename
    6681625