Network Security Policy Verification
نویسنده
چکیده
We present a unified theory for verifying network security policies. A security policy is represented as directed graph. To check high-level security goals, security invariants over the policy are expressed. We cover monotonic security invariants, i.e. prohibiting more does not harm security. We provide the following contributions for the security invariant theory. (i) Secure auto-completion of scenario-specific knowledge, which eases usability. (ii) Security violations can be repaired by tightening the policy iff the security invariants hold for the deny-all policy. (iii) An algorithm to compute a security policy. (iv) A formalization of stateful connection semantics in network security mechanisms. (v) An algorithm to compute a secure stateful implementation of a policy. (vi) An executable implementation of all the theory. (vii) Examples, ranging from an aircraft cabin data network to the analysis of a large real-world firewall. For a detailed description, see [2, 1]. Acknowledgements. This entry contains contributions by Lars Hupel and would not have made it into the AFP without him. I want to thank the Isabelle group Munich for always providing valuable help. I would like to express my deep gratitude to my supervisor, Georg Carle, for supporting this topic and facilitating further research possibilities in this field.
منابع مشابه
Formal Analysis of Security Policy Implementations in Enterprise Networks
The management of security, operations and services in large scale enterprise networks is becoming more difficult due to complex security policies of the organizations and also due to dynamic changes in network topologies. Typically, the global security policy of an enterprise network is implemented in a distributed fashion through appropriate sets of access control rules (ACL rules) across var...
متن کاملSurvey on the Use of Formal Languages/Models for the Specification, Verification, and Enforcement of Network Access-lists
Complexity of access-lists and the diversity of their specifications are continuously increasing. Stating the high level requirements as well as verification of the implemented policies became an impossible task if human intervention is required. Also, proving the soundness of these inter-related and confusing policies is very hard without an appropriate framework. Therefore, a formal and canon...
متن کاملVerifying Security Policies Using Host Attributes
For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion o...
متن کاملOn the Use of Formal Languages/Models for the Specification, Verification, and Enforcement of Network Access-lists CSC535: Term Paper
Complexity of access-lists and the diversity of their specifications are continuously increasing. Stating the high level requirements as well as verification of the implemented policies became an impossible task if human intervention is required. Also, proving the soundness of these inter-related and confusing policies is very hard without an appropriate framework. Therefore, a formal and canon...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Archive of Formal Proofs
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014