Network Security : Formal and Optimized Configuration

被引:0
|
作者
Fall, Marfall N. [1 ]
Mejri, Mohamed [1 ]
机构
[1] Univ Laval, Dept Informat & Genie Logiciel, Quebec City, PQ, Canada
来源
NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES | 2010年 / 217卷
关键词
Security Policy; Firewalls; Enforcement; Optimization; ENFORCEMENT;
D O I
10.3233/978-1-60750-629-4-229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Firewalls are crucial elements in enforcing network security policies. They have been widely deployed for securing private networks but, their configuration remains complex and error prone. During the last years, many techniques and tools have been proposed to correctly configure firewalls. However, most of existing works are informal and do not take into account the global performance of the network or other qualities of its services (QoS). In this paper we introduce a formal approach allowing to formally and optimally configure a network so that a given security policy is respected and by taking into account the QoS.
引用
收藏
页码:229 / 246
页数:18
相关论文
共 50 条
  • [1] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [2] A formal framework (Expression plus Analysis) for network security mechanisms configuration
    Laborde, R
    Barrère, F
    Benzekri, A
    Fourth IEEE International Symposium on Network Computing and Applications, Proceedings, 2005, : 223 - 226
  • [3] Security policy decision for automation of security network configuration
    Ahn, G
    Yoon, SY
    Kim, KY
    Jang, JS
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1057 - 1061
  • [4] Self-configuration of network security
    Chen, Huoping
    Al-Nashif, Youssif B.
    Qu, Guangzhi
    Hariri, Salim
    11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 97 - 108
  • [5] Formal security policy implementations in network firewalls
    Macfarlane, Richard
    Buchanan, William
    Ekonomou, Elias
    Uthmani, Omair
    Fan, Lu
    Lo, Owen
    COMPUTERS & SECURITY, 2012, 31 (02) : 253 - 270
  • [6] FORMAL SECURITY PROOF FOR A SCHEME ON A TOPOLOGICAL NETWORK
    Civino, Roberto
    Longo, Riccardo
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, : 562 - 571
  • [7] Formal analysis methods of network security design
    Stawowski, Mariusz
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
  • [8] A Formal Framework for Network Security Design Synthesis
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 560 - 570
  • [9] Principles of secure network configuration:: Towards a formal basis for self-configuration
    Foley, Simon N.
    Fitzgerald, William
    Bistarelli, Stefano
    O'Sullivan, Barry
    Foghlu, Micheal O.
    AUTONOMIC PRINCIPLES OF IP OPERATIONS AND MANAGEMENT, PROCEEDINGS, 2006, 4268 : 168 - 180
  • [10] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246