A model-driven approach for the extraction of network access-control policies

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network security constitutes a critical concern when developing and maintaining nowadays corporate information systems. Firewalls are a key element of network security by filtering the traffic of the network in compliance with a number of access control rules that enforce a given security policy. Unfortunately, once implemented, and due to the complexity of firewall configuration languages and the underlying network topology, knowing which security policy is actually being enforced by the network system is a complex and time consuming task that requires low-level and, often, vendor-specific expertise. In an always-evolving context, where security policies are often updated to respond to new security requirements, this discovery phase becomes critical since it could hamper the proper evolution of the system and compromise its security. To tackle this problem, our approach generates an abstract model of the firewall configurations in a network that facilitates the understanding and evolution of network security policies.

Original languageEnglish
Title of host publicationProceedings of the Workshop on Model-Driven Security, MDsec 2012
DOIs
Publication statusPublished - 1 Dec 2012
Externally publishedYes
EventWorkshop on Model-Driven Security, MDsec 2012 - Innsbruck, Austria
Duration: 1 Oct 20125 Oct 2012

Publication series

NameProceedings of the Workshop on Model-Driven Security, MDsec 2012

Conference

ConferenceWorkshop on Model-Driven Security, MDsec 2012
Country/TerritoryAustria
CityInnsbruck
Period1/10/125/10/12

Keywords

  • model-driven
  • reverse-engineering
  • security

Fingerprint

Dive into the research topics of 'A model-driven approach for the extraction of network access-control policies'. Together they form a unique fingerprint.

Cite this