A formal framework (Expression plus Analysis) for network security mechanisms configuration

被引:0
|
作者
Laborde, R [1 ]
Barrère, F [1 ]
Benzekri, A [1 ]
机构
[1] Univ Toulouse 3, IRIT, SIERA, F-31062 Toulouse, France
来源
Fourth IEEE International Symposium on Network Computing and Applications, Proceedings | 2005年
关键词
D O I
10.1109/NCA.2005.2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependencies of the devices to consider. We propose in this article a formal framework which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals.
引用
收藏
页码:223 / 226
页数:4
相关论文
共 50 条
  • [21] The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks
    Shorov, Andrey
    Kotenko, Igor
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [22] A FORMAL FRAMEWORK FOR MEDIATOR MECHANISMS AND MOTIVATIONS
    KAUFMAN, S
    DUNCAN, GT
    JOURNAL OF CONFLICT RESOLUTION, 1992, 36 (04) : 688 - 708
  • [23] Network Security Framework
    Gupta, Kapil Kumar
    Nath, Baikunth
    Ramamohanarao, Kotagiri
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B): : 151 - 157
  • [24] A Formal Approach for Network Security Management Based on Qualitative Risk Analysis
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 244 - 251
  • [25] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Bernardeschi, Cinzia
    Dini, Gianluca
    Palmieri, Maurizio
    Racciatti, Francesco
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (03) : 249 - 263
  • [26] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Cinzia Bernardeschi
    Gianluca Dini
    Maurizio Palmieri
    Francesco Racciatti
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 249 - 263
  • [27] Security policy decision for automation of security network configuration
    Ahn, G
    Yoon, SY
    Kim, KY
    Jang, JS
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1057 - 1061
  • [28] Self-configuration of network security
    Chen, Huoping
    Al-Nashif, Youssif B.
    Qu, Guangzhi
    Hariri, Salim
    11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 97 - 108
  • [29] Complete analysis of configuration rules to guarantee reliable network security policies
    Alfaro, J. G.
    Boulahia-Cuppens, N.
    Cuppens, F.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 103 - 122
  • [30] Complete analysis of configuration rules to guarantee reliable network security policies
    J. G. Alfaro
    N. Boulahia-Cuppens
    F. Cuppens
    International Journal of Information Security, 2008, 7 : 103 - 122