Verification of the pocket filtering based on method of verification on the model

Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich
{"title":"Verification of the pocket filtering based on method of verification on the model","authors":"Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich","doi":"10.1109/ICISCT47635.2019.9011901","DOIUrl":null,"url":null,"abstract":"In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT47635.2019.9011901","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于模型验证方法的口袋滤波验证
本文提出了一种过滤规则的验证方法,旨在检测和解决计算机网络安全策略规范中的过滤异常。该方法基于对模型的验证方法。该方法考虑了计算机系统模型、防火墙模型和过滤异常模型,为过滤规则的验证提供了依据。以及检测这种异常的算法。提出了一种基于这些模型的安全策略过滤规则验证技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Transport System Reliability Study Multi-Service Network Based On Simulation Communication And Information Technology Is A Way Of Changing Education Selecting suitable deep learning network for face recognition Statistical properties of a periodically modulated radiation in a multimode fibers Development of the automatic control system of the process of enrichment of technogenic waste
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1