Model-driven extraction and analysis of network security policies

9Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy being enforced by a network system is a critical information. Otherwise, we risk to hamper the proper evolution of the system and compromise its security. Unfortunately, discovering such enforced policy is an error-prone and time consuming task that requires low-level and, often, vendor-specific expertise since firewalls may be configured using different languages and conform to a complex network topology. To tackle this problem, we propose a model-driven reverse engineering approach able to extract the security policy implemented by a set of firewalls in a working network, easing the understanding, analysis and evolution of network security policies. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Martínez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., & Cabot, J. (2013). Model-driven extraction and analysis of network security policies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8107 LNCS, pp. 52–68). https://doi.org/10.1007/978-3-642-41533-3_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free