Network Security Policy Verification

نویسنده

  • Cornelius Diekmann
چکیده

We present a unified theory for verifying network security policies. A security policy is represented as directed graph. To check high-level security goals, security invariants over the policy are expressed. We cover monotonic security invariants, i.e. prohibiting more does not harm security. We provide the following contributions for the security invariant theory. (i) Secure auto-completion of scenario-specific knowledge, which eases usability. (ii) Security violations can be repaired by tightening the policy iff the security invariants hold for the deny-all policy. (iii) An algorithm to compute a security policy. (iv) A formalization of stateful connection semantics in network security mechanisms. (v) An algorithm to compute a secure stateful implementation of a policy. (vi) An executable implementation of all the theory. (vii) Examples, ranging from an aircraft cabin data network to the analysis of a large real-world firewall. For a detailed description, see [2, 1]. Acknowledgements. This entry contains contributions by Lars Hupel and would not have made it into the AFP without him. I want to thank the Isabelle group Munich for always providing valuable help. I would like to express my deep gratitude to my supervisor, Georg Carle, for supporting this topic and facilitating further research possibilities in this field.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Analysis of Security Policy Implementations in Enterprise Networks

The management of security, operations and services in large scale enterprise networks is becoming more difficult due to complex security policies of the organizations and also due to dynamic changes in network topologies. Typically, the global security policy of an enterprise network is implemented in a distributed fashion through appropriate sets of access control rules (ACL rules) across var...

متن کامل

Survey on the Use of Formal Languages/Models for the Specification, Verification, and Enforcement of Network Access-lists

Complexity of access-lists and the diversity of their specifications are continuously increasing. Stating the high level requirements as well as verification of the implemented policies became an impossible task if human intervention is required. Also, proving the soundness of these inter-related and confusing policies is very hard without an appropriate framework. Therefore, a formal and canon...

متن کامل

Verifying Security Policies Using Host Attributes

For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion o...

متن کامل

On the Use of Formal Languages/Models for the Specification, Verification, and Enforcement of Network Access-lists CSC535: Term Paper

Complexity of access-lists and the diversity of their specifications are continuously increasing. Stating the high level requirements as well as verification of the implemented policies became an impossible task if human intervention is required. Also, proving the soundness of these inter-related and confusing policies is very hard without an appropriate framework. Therefore, a formal and canon...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Archive of Formal Proofs

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014