Inconsistency Analysis of Time-Based Security Policy and Firewall Policy

被引:2
|
作者
Yin, Yi [1 ,2 ]
Tateiwa, Yuichiro [3 ]
Wang, Yun [1 ]
Katayama, Yoshiaki [3 ]
Takahashi, Naohisa [3 ]
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[3] Nagoya Inst Technol, Grad Sch Engn, Dept Comp Sci & Engn, Nagoya, Aichi, Japan
基金
中国国家自然科学基金;
关键词
Security policy; Firewall policy; Time-based rules; Satisfiability modulo theories;
D O I
10.1007/978-3-319-68690-5_27
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Packet filtering in firewall either accepts or denies packets based upon a set of predefined rules called firewall policy. In recent years, time-based firewall policies are widely used in many firewalls such as CISCO ACLs. Firewall policy is always designed under the instruction of security policy, which is a generic document that outlines the needs for network access permissions. It is difficult to maintain the consistency of normal firewall policy and security policy, not to mention time-based firewall policy and security policy. Even though there are many analysis methods for security policy and firewall policy, they cannot deal with time constraint. To resolve this problem, we firstly represent time-based security policy and firewall policy as logical formulas, and then use satisfiability modulo theories (SMT) solver Z3 to verify them and analyze inconsistency. We have implemented a prototype system to verify our proposed method, experimental results showed the effectiveness.
引用
收藏
页码:447 / 463
页数:17
相关论文
共 50 条
  • [31] The time-inconsistency of alternative energy policy
    Vignolo, Thierry
    d'Artigues, Agnes
    Percebois, Jacques
    ECONOMICS BULLETIN, 2007, 1
  • [32] Establishing firewall policy
    Cobb, S
    SOUTHCON/96 - CONFERENCE RECORD, 1996, : 198 - 205
  • [33] Dynamic update of firewall policy based on MFDT
    Chen, Wenhui
    Wang, Weiping
    Li, Zhepeng
    Chen, Huaping
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1117 - 1120
  • [34] HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis
    Lee, Hyunjung
    Lee, Suryeon
    Kim, Kyounggon
    Kim, Huy Kang
    IEEE ACCESS, 2021, 9 : 71737 - 71753
  • [35] Policy and implementation of an adaptive firewall
    Verwoerd, T
    Hunt, R
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON 2002), PROCEEDINGS, 2002, : 434 - 439
  • [36] Using argumentation logic for firewall policy specification and analysis
    Bandara, Arosha K.
    Kakas, Antonis
    Lupu, Emil C.
    Russo, Alessandra
    LARGE SCALE MANAGEMENT OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4269 : 185 - 196
  • [37] Time inconsistency and the exchange rate channel of monetary policy
    Leitemo, K
    Roisland, O
    Torvik, R
    SCANDINAVIAN JOURNAL OF ECONOMICS, 2002, 104 (03): : 391 - 397
  • [38] Investment in education and the time inconsistency of redistributive tax policy
    Boadway, R
    Marceau, N
    Marchand, M
    ECONOMICA, 1996, 63 (250) : 171 - 189
  • [39] FORECASTING GOVERNMENT POLICY - AN EXAMPLE OF THE IMPORTANCE OF TIME INCONSISTENCY
    WESTAWAY, P
    WRENLEWIS, S
    INTERNATIONAL JOURNAL OF FORECASTING, 1990, 6 (03) : 401 - 405
  • [40] Arguing About Firewall Policy
    Applebaum, Andy
    Levitt, Karl
    Rowe, Jeff
    Parsons, Simon
    COMPUTATIONAL MODELS OF ARGUMENT, 2012, 245 : 91 - +