Policy-based Proactive monitoring of security policy performance

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers the suggested approach to proactive monitoring of security policy performance and security mechanisms functioning. This approach is based on the different strategies of automatic imitation of possible users' actions in the computer network, including exhaustive search, express-analysis and generating the optimized test sequences. It is applicable to different security policies (authentication, authorization, filtering, communication channel protection, etc.). The paper describes stages, generalized algorithms and main peculiarities of the suggested approach and formal methods used to fulfill the test sequence optimization. We consider the generalized architecture of the proactive monitoring system "Proactive security scanner" (PSC) developed, its implementation and an example of policy testing. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Bogdanov, V., & Kotenko, I. (2007). Policy-based Proactive monitoring of security policy performance. In Communications in Computer and Information Science (Vol. 1, pp. 197–212). https://doi.org/10.1007/978-3-540-73986-9_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free