An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver

被引:1
|
作者
Yin, Yi [1 ,2 ]
Tateiwa, Yuichiro [3 ]
Wang, Yun [1 ]
Katayama, Yoshiaki [3 ]
Takahashi, Naohisa [3 ]
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[3] Nagoya Inst Technol, Grad Sch Engn, Dept Comp Sci & Engn, Nagoya, Aichi, Japan
来源
基金
中国国家自然科学基金;
关键词
Security policy; Firewall policy; CSP problem;
D O I
10.1007/978-3-319-68542-7_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined rules called firewall policy. Firewall policy always designed under the instruction of security policy, which is a generic document that outlines the needs for network access permissions. The design of firewall policy should be consistent with security policy. If firewall policy is not consistent with security policy, firewall policy may violate the intentions of security policy, which is the reason that result in critical security vulnerabilities. This paper extends our previous method, which represented security policy and firewall policy as Constraint Satisfaction Problem (CSP) and used a CSP solver Sugar only to verify whether they are consistent. In this paper, we propose a method to detect and resolve inconsistencies of firewall policy and security policy. We have implemented a prototype system to verify our proposed method, experimental results show the effectiveness.
引用
收藏
页码:147 / 161
页数:15
相关论文
共 50 条
  • [31] Practical firewall policy inspection using anomaly detection and its visualization
    Kim, Ui-Hyong
    Kang, Jung-Min
    Lee, Jae-Sung
    Kim, Hyong-Shik
    Jung, Soon-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 71 (02) : 627 - 641
  • [32] The Time Inconsistency of Delegation-Based Time Inconsistency Solutions in Monetary Policy
    Bilbiie, Florin O.
    JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS, 2011, 150 (03) : 657 - 674
  • [33] Practical firewall policy inspection using anomaly detection and its visualization
    Ui-Hyong Kim
    Jung-Min Kang
    Jae-Sung Lee
    Hyong-Shik Kim
    Soon-Young Jung
    Multimedia Tools and Applications, 2014, 71 : 627 - 641
  • [34] Large Language Model Firewall for AIGC Protection with Intelligent Detection Policy
    Huang, Tianrui
    You, Lina
    Cai, Nishui
    Huang, Ting
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 247 - 252
  • [35] The Time Inconsistency of Delegation-Based Time Inconsistency Solutions in Monetary Policy
    Florin O. Bilbiie
    Journal of Optimization Theory and Applications, 2011, 150 : 657 - 674
  • [36] A Framework for Policy Inconsistency Detection in Software-Defined Networks
    Lee, Seungsoo
    Woo, Seungwon
    Kim, Jinwoo
    Nam, Jaehyun
    Yegneswaran, Vinod
    Porras, Phillip
    Shin, Seungwon
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (03) : 1410 - 1423
  • [37] Policy-based inconsistency management in relational databases
    Martinez, Maria Vanina
    Parisi, Francesco
    Pugliese, Andrea
    Simari, Gerardo I.
    Subrahmanian, V. S.
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2014, 55 (02) : 501 - 528
  • [38] Protocol decode based stateful firewall policy definition language
    Parmar, PN
    Rajagopal, P
    Sahita, R
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 201 - 204
  • [39] A Policy Integration Method Based on Multilevel Security for Data Integration
    WANG Xinming
    TAN Haoxiang
    CHEN Kaijun
    TANG Hua
    ZHAO Gansen
    TANG Yong
    NIE Ruihua
    WuhanUniversityJournalofNaturalSciences, 2015, 20 (06) : 483 - 489
  • [40] The Optimal Monetary Policy Rule Based on Time Inconsistency
    Song, Yang Xin
    Zhao, Li
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT ICPEM 2009, VOL 7: CLUSTER ANALYSIS, 2009, : 425 - 428