DocumentCode :
627451
Title :
A formal approach for network security management based on qualitative risk analysis
Author :
Rahman, Md Arifur ; Al-Shaer, Ehab
Author_Institution :
CyberDNA Res. Center, Univ. of North Carolina, Charlotte, NC, USA
fYear :
2013
fDate :
27-31 May 2013
Firstpage :
244
Lastpage :
251
Abstract :
The risk analysis is an important process for enforcing and strengthening efficient and effective security. Due to the significant growth of the Internet, application services, and associated security attacks, information professionals face challenges in assessing risk of their networks. The assessment of risk may vary with the enterprise´s requirements. Hence, a generic risk analysis technique is suitable. Moreover, configuring a network with correct security policy is a difficult problem. The assessment of risk aids in realizing necessary security policy. Risk is a function of security threat and impact. Security threats depend on the traffic reachability. Security devices like firewalls are used to selectively allow or deny traffic. However, the connection between the network risk and the security policy is not easy to establish. A small modification in the network topology or in the security policy, can change the risk significantly. It is hard to manually follow a systematic process for configuring the network towards security hardening. Hence, an automatic generation of proper security controls, e.g., firewall rules and host placements in the network topology, is crucial to keep the overall security risk low. In this paper, we first present a declarative model for the qualitative risk analysis. We consider transitive reachability, i.e., reachability considering one or more intermediate hosts, in order to compute exposure of vulnerabilities. Next, we formalize our risk analysis model and the security requirements as a constraint satisfaction problem using the satisfiability modulo theories (SMT). A solution to the problem synthesizes necessary firewall policies and host placements. We also evaluate the scalability of the proposed risk analysis technique as well as the synthesis model.
Keywords :
Internet; computability; computer network management; firewalls; reachability analysis; risk analysis; telecommunication network topology; telecommunication traffic; Internet; SMT; application services; associated security attacks; constraint satisfaction problem; firewall policies; formal approach; generic risk analysis technique; host placements; network risk; network security management; network topology; qualitative risk analysis model; risk assessment; satisfiability modulo theories; security control automatic generation; security policy; security threats; synthesis model; traffic reachability; transitive reachability; Analytical models; Computational modeling; Internet; Measurement; Network topology; Risk analysis; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on
Conference_Location :
Ghent
Print_ISBN :
978-1-4673-5229-1
Type :
conf
Filename :
6572992
Link To Document :
بازگشت