Model-driven extraction and analysis of network security policies

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy being enforced by a network system is a critical information. Otherwise, we risk to hamper the proper evolution of the system and compromise its security. Unfortunately, discovering such enforced policy is an error-prone and time consuming task that requires low-level and, often, vendor-specific expertise since firewalls may be configured using different languages and conform to a complex network topology. To tackle this problem, we propose a model-driven reverse engineering approach able to extract the security policy implemented by a set of firewalls in a working network, easing the understanding, analysis and evolution of network security policies.

Original languageEnglish
Title of host publicationModel-Driven Engineering Languages and Systems - 16th International Conference, MODELS 2013, Proceedings
Pages52-68
Number of pages17
DOIs
Publication statusPublished - 7 Nov 2013
Event16th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2013 - Miami, FL, United States
Duration: 29 Sept 20134 Oct 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8107 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2013
Country/TerritoryUnited States
CityMiami, FL
Period29/09/134/10/13

Fingerprint

Dive into the research topics of 'Model-driven extraction and analysis of network security policies'. Together they form a unique fingerprint.

Cite this