A Query Driven Security Testing Framework for Enterprise Network

被引:0
作者
Bera, Padmalochan [1 ]
Ghosh, Soumya Kanti [2 ]
机构
[1] Infosys Labs, Bangalore 560100, Karnataka, India
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
来源
IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2013) | 2013年
关键词
Network Security; Access Control Lists Satisfiability Analysis; Security Testing; VERIFICATION; DISCOVERY;
D O I
10.1109/ICSTW.2013.62
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Due to extensive use of various network services and web based applications and heterogeneous organizational security requirements; enterprise network configuration is becoming very complex that imposes high operational workload on both regular and experienced administrators. This complexity extensively reduces overall network assurability and usability which in turn make the network vulnerable to various cyber-attacks. Network Access Control Lists (ACLs) is a standard for implementing security configurations in enterprise networks. However, the size and distributed placement of the ACLs in the network impose significant complexity as well as introduce potential scope of security misconfigurations. In this paper, we present a query driven security testing framework to assess the correctness and consistency of the access control list (ACL) based security implementations in an enterprise network. It will allow the network administrators to systematically test the ACL configurations with various interactive service access queries. The framework is built on top of a satisfiability analysis (SAT) engine. The efficacy of the framework is evaluated with extensive experimentations on real and synthetic networks.
引用
收藏
页码:476 / 483
页数:8
相关论文
共 18 条
  • [1] Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security
    Al-Shaer, Ehab
    Marrero, Will
    El-Atawy, Adel
    ElBadawi, Khalid
    [J]. 2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 123 - +
  • [2] Al-Shaer ES, 2004, IEEE INFOCOM SER, P2605
  • [3] Firewall policy advisor for anomaly discovery and rule editing
    Al-Shaer, ES
    Hamed, HH
    [J]. INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 17 - 30
  • [4] Firmato:: A novel firewall management toolkit
    Bartal, Y
    Mayer, A
    Nissim, K
    Wool, A
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2004, 22 (04): : 381 - 420
  • [5] Bera P., 2010, IEEE Transactions on Network and Service Management, V7, P231, DOI 10.1109/TNSM.2010.1012.0365
  • [6] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [7] Bera P, 2009, LECT NOTES COMPUT SC, V5905, P117, DOI 10.1007/978-3-642-10772-6_10
  • [8] Giunchiglia E., 2001, Automated Reasoning. First International Joint Conference, IJCAR 2001. Proceedings (Lecture Notes in Artificial Intelligence Vol.2083), P364
  • [9] Gouda MohamedG., 2008, Global Telecommunications Conference, P1
  • [10] HAO JX, 1992, PROCEEDINGS OF THE THIRD ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P165