DocumentCode
87912
Title
Formal integrated network security analysis tool: formal query-based network security configuration analysis
Author
Maity, Soumya ; Bera, P. ; Ghosh, Soumya K. ; Al-Shaer, Ehab
Author_Institution
Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, Kharagpur, India
Volume
4
Issue
2
fYear
2015
fDate
3 2015
Firstpage
137
Lastpage
147
Abstract
Owing to increasing complexity of network configurations with large topology and use of heterogeneous network services, enterprise networks deploy various security measures based on the organisational security policies. Typically, security policy represents the high level requirements for controlling the resource accesses by traffic source, destination, protocol, access time and so on. Security policies are implemented in the network devices (routers, firewalls and so on) in a distributed fashion through various access control lists (ACLs). The ACL configurations may contain different level of inconsistencies which may make the network vulnerable. In addition, there may exist inconsistent `hidden access paths´ in the implementation because of transitive access relationships between the network services. Further, the failure of network link(s) may form alternative routing paths that violate ACL. Manual analysis of this problem can be overwhelming and potentially inaccurate. In this study, a query-based formal security analysis tool has been presented that automates the process using Boolean satisfiability (SAT). The tool allows network administrators to systematically evaluate the distributed ACL configurations through various standard and complex service access queries. The tool evaluates the static access queries through SAT-based decision procedures, and the fault-based queries (under network link failures) through graph mining procedures.
Keywords
authorisation; computability; computational complexity; computer network security; data mining; graph theory; protocols; query processing; telecommunication network topology; ACL conflgurations; Boolean satisflability; SAT-based decision procedures; access control lists; complex service access queries; enterprise networks; fault-based queries; formal integrated network security analysis tool; formal query-based network security configuration analysis; graph mining procedures; heterogeneous network services; hidden access paths; large topology; network conflgurations complexity; network devices; organisational security policies; protocol; query-based formal security analysis tool; security measures; security policy; static access queries; trafflc source;
fLanguage
English
Journal_Title
Networks, IET
Publisher
iet
ISSN
2047-4954
Type
jour
DOI
10.1049/iet-net.2013.0090
Filename
7054603
Link To Document