Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach

Soumyadev Maity, P. Bera, Soumya K. Ghosh
{"title":"Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach","authors":"Soumyadev Maity, P. Bera, Soumya K. Ghosh","doi":"10.1109/ISED.2012.72","DOIUrl":null,"url":null,"abstract":"Due to extensive use of network services and applications, most of the enterprise networks today deploy policy based security devices (e.g. routers, firewalls, IPSec etc.) for controlling accesses to network resources based on organizational security policy. The organizational network security policy is becoming more fine-grained, where access control list (ACL) configuration depends on various constraints like, service priority, time, location etc. The major challenge that the network administrators are facing today is to determine the correct access control configurations that satisfy the organizational policy. Throughout the last two decades, a significant amount of research has been done in formally verifying the correctness and consistency of access control policy configurations in enterprise network. However, this bottom-up analysis may not be useful because of its high state-space requirement for large scale networks. In addition, this approach requires repairing sequences of misconfigurations iteratively to meet a specific requirement. This paper presents a framework for synthesizing correct and conflict-free ACL configuration model, given the global organizational security policy and underlying network topology. This framework includes two major functions: (i) deriving the conflict-free model of the organizational security policy, and (ii) extraction of the correct ACL distributions for the network. The framework formally models the organizational security policy and generates the conflict-free policy model by resolving the policy rule conflicts. Then, ACL model is extracted based on the conflict-free policy model and the underlying network topology. The efficacy of the proposed framework has been demonstrated through a case study.","PeriodicalId":276803,"journal":{"name":"2012 International Symposium on Electronic System Design (ISED)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Symposium on Electronic System Design (ISED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISED.2012.72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Due to extensive use of network services and applications, most of the enterprise networks today deploy policy based security devices (e.g. routers, firewalls, IPSec etc.) for controlling accesses to network resources based on organizational security policy. The organizational network security policy is becoming more fine-grained, where access control list (ACL) configuration depends on various constraints like, service priority, time, location etc. The major challenge that the network administrators are facing today is to determine the correct access control configurations that satisfy the organizational policy. Throughout the last two decades, a significant amount of research has been done in formally verifying the correctness and consistency of access control policy configurations in enterprise network. However, this bottom-up analysis may not be useful because of its high state-space requirement for large scale networks. In addition, this approach requires repairing sequences of misconfigurations iteratively to meet a specific requirement. This paper presents a framework for synthesizing correct and conflict-free ACL configuration model, given the global organizational security policy and underlying network topology. This framework includes two major functions: (i) deriving the conflict-free model of the organizational security policy, and (ii) extraction of the correct ACL distributions for the network. The framework formally models the organizational security policy and generates the conflict-free policy model by resolving the policy rule conflicts. Then, ACL model is extracted based on the conflict-free policy model and the underlying network topology. The efficacy of the proposed framework has been demonstrated through a case study.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
企业网络中基于策略的ACL配置综合:一种形式化方法
由于网络服务和应用程序的广泛使用,今天大多数企业网络都部署了基于策略的安全设备(如路由器、防火墙、IPSec等),以根据组织安全策略控制对网络资源的访问。组织网络安全策略正变得越来越细粒度,其中访问控制列表(ACL)配置依赖于各种约束,如服务优先级、时间、位置等。网络管理员目前面临的主要挑战是确定满足组织策略的正确访问控制配置。在过去的二十年中,在正式验证企业网络中访问控制策略配置的正确性和一致性方面进行了大量的研究。然而,这种自底向上的分析可能并不有用,因为它对大规模网络的状态空间要求很高。此外,这种方法需要迭代地修复错误配置序列以满足特定的需求。在给定全局组织安全策略和底层网络拓扑结构的情况下,提出了一个综合正确且无冲突的ACL配置模型的框架。该框架包括两个主要功能:(i)导出组织安全策略的无冲突模型,以及(ii)为网络提取正确的ACL分布。框架对组织安全策略进行形式化建模,并通过解决策略规则冲突生成无冲突策略模型。然后,基于无冲突策略模型和底层网络拓扑结构提取ACL模型。通过一个案例研究证明了所提出的框架的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multi-objective Low-Power CDFG Scheduling Using Fine-Grained DVS Architecture in Distributed Framework Improvement in Target Detectability Using Spread Spectrum Radar in Dispersive Channel Condition Systolic Variable Length Architecture for Discrete Fourier Transform in Long Term Evolution High Speed Generic Network Interface for Network on Chip Using Ping Pong Buffers Synthesis of Toffoli Networks: Status and Challenges
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1