Algorithm to automatically solve security policy conflicts among IP devices configurations

One of the most critical aspects of security problems is the impossibility of accurately checking a system real weaknesses. In a complex and distributed environment this problem is greatly accentuated. During the process of configuration and implementation of the network security policies errors can...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ferraresi, S., Francocci, E., Quaglini, A., Baiocchi, A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:One of the most critical aspects of security problems is the impossibility of accurately checking a system real weaknesses. In a complex and distributed environment this problem is greatly accentuated. During the process of configuration and implementation of the network security policies errors can occur, resulting in holes in security and, consequently, compromising the entire system functionality. These errors are often very hard to detect by performing a manual or visual inspection. For this reason, automatic management of this phase is required. Here we propose an algorithm to automatically tune up the configurations of the network devices in order to avoid unexpected and unwanted network behaviours. This algorithm will be described in all its phases and some results of the software implementation will be shown.
ISSN:1542-1201
2374-9709
DOI:10.1109/NOMS.2008.4575248