Ontology-based Security Policy Translation
نویسندگان
چکیده
The security configuration of large networked ICT systems is a difficult and error-prone task. Quite often attacks are enabled by mis-configurations generated by human errors. Policybased network management has been proposed to cope with this problem: goals are expressed as high-level rules that are then translated into low-level configurations for network devices. While the concept is clear, there is a lack of tools supporting this strategy. We propose an ontology-based policy translation approach that mimics the behaviour of expert administrators, without their mistakes. Normally administrators are given the high-level security goals and then, through their knowledge of network topology and security best practice, derive the device configurations. In a similar way, we use an ontology to represent the domain knowledge and then perform reasoning (based on best practice rules) to create the configurations for network-level security controls (e.g., firewall and secure channels). If some information is missing from the ontology, the administrator is guided to provide the missing data. The configurations generated by our approach are represented in a vendor-independent format and therefore can be used with several kinds of devices.
منابع مشابه
Ontology-Based Policy Translation
Quite often attacks are enabled by mis-configurations generated by human errors. Policy-based network management has been proposed to cope with this problem: goals are expressed as high-level rules that are then translated into low-level configurations for network devices. While the concept is clear, there is a lack of tools supporting this strategy. We propose an ontology-based policy translat...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملSecurity Requirements Elaborations for Grid Data Management Systems
In this paper, we present a goal-oriented approach to design policies for managing security requirements of critical information infrastructures (CII). The approach, adapted from a standard and widely accepted requirements engineering methodology, is applied to the security analysis of a specific CII: Grid Data Management Systems (GDMS). Based on domain ontologies, combining concepts borrowed b...
متن کاملOntology-Based Matching of Security Attributes for Personal Data Access in e-Health
This paper discusses an interoperability solution (tool) for the internal management of a policy decision engine located at the level of the authorization layer of a service oriented environment. The tool aims to support federated access control in the context of distributed architectures, in which a local authorization policy is not able to recognize all the attributes in the authorization dec...
متن کاملAn ontology-based policy for deploying secure SIP-based VoIP services
— Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the Internet, raises several security issues that must be accounted for. On top of that, there are new sophisticated attacks against VoIP infrastructures that capitalize on vulnerabilities of the protocols employed for the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010