Formal analysis of security policy implementations in enterprise networks

Bera, P ; Dasgupta, Pallab ; Ghosh, S K (2009) Formal analysis of security policy implementations in enterprise networks International Journal of Computer Networks & Communications, 1 (2). pp. 56-73. ISSN 0975-2293

[img]
Preview
PDF - Other
488kB

Abstract

The management of security, operations and services in large scale enterprise networks is becoming more difficult due to complex security policies of the organizations and also due to dynamic changes in network topologies. Typically, the global security policy of an enterprise network is implemented in a distributed fashion through appropriate sets of access control rules (ACL rules) across various interface switches (layer 3 switches) in the network. In such networks, verification of the ACL implementations with respect to the security policies is a major technical challenge to the network administrators. This is difficult to achieve manually, because of the complex policy constraints (temporal access constraints) and the presence of hidden access paths in the network which may in turn violate one or more policy rules implicitly. The inconsistent hidden access paths may be formed due to transitive relationships between implemented service access paths in the network. Moreover, the complexity of the problem is compounded due to dynamic changes in network topologies. In any point of time, the failure of the network interfaces or links may change the network topology as a result alternative routing paths can be formed for forwarding various service packets. Hence, the existing security implementation (distribution of ACL rules) may not satisfy the policies. In this paper, a fault analysis module is incorporated along with the verification framework which as a whole can derive a correct ACL implementation with respect to a given security policy specification and can ensure that a correct security implementation is fault tolerant to certain number of link failures. The verification module can find the correct security implementation and the fault analysis module can find the number of link failures the existing security implementation can tolerate and still satisfy the security policy of the network.

Item Type:Article
Source:Copyright of this article belongs to Academy & Industry Research Collaboration Center.
Keywords:LAN; Network Security; Security Policy; Access Control Lists (ACL); SAT Based Verification
ID Code:101404
Deposited On:09 Mar 2018 10:16
Last Modified:09 Mar 2018 10:16

Repository Staff Only: item control page