DocumentCode :
1404795
Title :
Policy Based Security Analysis in Enterprise Networks: A Formal Approach
Author :
Bera, P. ; Ghosh, S.K. ; Dasgupta, Pallab
Author_Institution :
Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, India
Volume :
7
Issue :
4
fYear :
2010
fDate :
12/1/2010 12:00:00 AM
Firstpage :
231
Lastpage :
243
Abstract :
In a typical enterprise network, there are several sub-networks or network zones corresponding to different departments or sections of the organization. These zones are interconnected through set of Layer-3 network devices (or routers). The service accesses within the zones and also with the external network (e.g., Internet) are usually governed by a enterprise-wide security policy. This policy is implemented through appropriate set of access control lists (ACL rules) distributed across various network interfaces of the enterprise network. Such networks faces two major security challenges, (i) conflict free representation of the security policy, and (ii) correct implementation of the policy through distributed ACL rules. This work presents a formal verification framework to analyze the security implementations in an enterprise network with respect to the organizational security policy. It generates conflict-free policy model from the enterprise-wide security policy and then formally verifies the distributed ACL implementations with respect to the conflict-free policy model. The complexity in the verification process arises from extensive use of temporal service access rules and presence of hidden service access paths in the networks. The proposed framework incorporates formal modeling of conflict-free policy specification and distributed ACL implementation in the network and finally deploys Boolean satisfiability (SAT) based verification procedure to check the conformation between the policy and implementation models.
Keywords :
authorisation; business data processing; computability; computer network security; formal verification; network routing; Boolean satisfiability; access control lists; conflict-free policy model; conflict-free policy specification; enterprise networks; enterprise-wide security policy; formal verification; hidden service access paths; layer-3 network devices; policy based security analysis; routers; temporal service access rules; Access control; Analytical models; Boolean functions; IP networks; Internet; Network topology; Network security; SAT based verification; access control policies (ACL);
fLanguage :
English
Journal_Title :
Network and Service Management, IEEE Transactions on
Publisher :
ieee
ISSN :
1932-4537
Type :
jour
DOI :
10.1109/TNSM.2010.1012.0365
Filename :
5668979
Link To Document :
بازگشت