TY - GEN
T1 - A model-driven approach for the extraction of network access-control policies
AU - Martínez, Salvador
AU - Cabot, Jordi
AU - Garcia-Alfaro, Joaquin
AU - Cuppens, Frédéric
AU - Cuppens-Boulahia, Nora
PY - 2012/12/1
Y1 - 2012/12/1
N2 - Network security constitutes a critical concern when developing and maintaining nowadays corporate information systems. Firewalls are a key element of network security by filtering the traffic of the network in compliance with a number of access control rules that enforce a given security policy. Unfortunately, once implemented, and due to the complexity of firewall configuration languages and the underlying network topology, knowing which security policy is actually being enforced by the network system is a complex and time consuming task that requires low-level and, often, vendor-specific expertise. In an always-evolving context, where security policies are often updated to respond to new security requirements, this discovery phase becomes critical since it could hamper the proper evolution of the system and compromise its security. To tackle this problem, our approach generates an abstract model of the firewall configurations in a network that facilitates the understanding and evolution of network security policies.
AB - Network security constitutes a critical concern when developing and maintaining nowadays corporate information systems. Firewalls are a key element of network security by filtering the traffic of the network in compliance with a number of access control rules that enforce a given security policy. Unfortunately, once implemented, and due to the complexity of firewall configuration languages and the underlying network topology, knowing which security policy is actually being enforced by the network system is a complex and time consuming task that requires low-level and, often, vendor-specific expertise. In an always-evolving context, where security policies are often updated to respond to new security requirements, this discovery phase becomes critical since it could hamper the proper evolution of the system and compromise its security. To tackle this problem, our approach generates an abstract model of the firewall configurations in a network that facilitates the understanding and evolution of network security policies.
KW - model-driven
KW - reverse-engineering
KW - security
UR - https://www.scopus.com/pages/publications/84873844245
U2 - 10.1145/2422498.2422503
DO - 10.1145/2422498.2422503
M3 - Conference contribution
AN - SCOPUS:84873844245
SN - 9781450318068
T3 - Proceedings of the Workshop on Model-Driven Security, MDsec 2012
BT - Proceedings of the Workshop on Model-Driven Security, MDsec 2012
T2 - Workshop on Model-Driven Security, MDsec 2012
Y2 - 1 October 2012 through 5 October 2012
ER -