TY - GEN
T1 - Model-driven extraction and analysis of network security policies
AU - Martínez, Salvador
AU - Garcia-Alfaro, Joaquin
AU - Cuppens, Frédéric
AU - Cuppens-Boulahia, Nora
AU - Cabot, Jordi
PY - 2013/11/7
Y1 - 2013/11/7
N2 - Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy being enforced by a network system is a critical information. Otherwise, we risk to hamper the proper evolution of the system and compromise its security. Unfortunately, discovering such enforced policy is an error-prone and time consuming task that requires low-level and, often, vendor-specific expertise since firewalls may be configured using different languages and conform to a complex network topology. To tackle this problem, we propose a model-driven reverse engineering approach able to extract the security policy implemented by a set of firewalls in a working network, easing the understanding, analysis and evolution of network security policies.
AB - Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy being enforced by a network system is a critical information. Otherwise, we risk to hamper the proper evolution of the system and compromise its security. Unfortunately, discovering such enforced policy is an error-prone and time consuming task that requires low-level and, often, vendor-specific expertise since firewalls may be configured using different languages and conform to a complex network topology. To tackle this problem, we propose a model-driven reverse engineering approach able to extract the security policy implemented by a set of firewalls in a working network, easing the understanding, analysis and evolution of network security policies.
U2 - 10.1007/978-3-642-41533-3_4
DO - 10.1007/978-3-642-41533-3_4
M3 - Conference contribution
AN - SCOPUS:84886840816
SN - 9783642415326
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 52
EP - 68
BT - Model-Driven Engineering Languages and Systems - 16th International Conference, MODELS 2013, Proceedings
T2 - 16th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2013
Y2 - 29 September 2013 through 4 October 2013
ER -