Formal specification, verification and correction of security policies based on the decision tree approach
Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.3, No. 3)Publication Date: 2013-08-31
Authors : Kamel Karoui; Fakher Ben ftima; Henda Ghezala;
Page : 92-111
Keywords : security policy; relevancy; anomalies detection; formal specification; formal verification; formal correction;
Abstract
Security components such as firewalls, IDS and IPS, are the mainstay and the most widely adopted technology for protecting networks. These security components are configured according to a global security policy.? An error in a security policy either? creates?? security? holes? that will allow malicious? traffic to sneak? into a private? network? or blocks legitimate? traffic and? disrupts? normal business?? processes,?? which, in turn, could lead to irreparable consequences. It has been observed?? that most security policies on the Internet are poorly designed?? and have many misconfigurations.? In this paper, we propose a formal process to specify, verify and correct the security policy using the decision tree formalism, which consists of four steps. First, we define the security policy specifications and write it in a natural language. Second, the security policy will be translated into a formal language. Third, we verify the security policy correctness. If this latter is plugged with anomalies, we correct it in the last step.To achieve these goals, we present a decision tree based formalism for security policy verification and propose a correction algorithm to guarantee the security policy correctness. A case study will demonstrate the usefulness of our approach.
Other Latest Articles
- Technologies of cracking of cryptographic algorithms through the analysis of dynamics of consuming of power in case of their implementation
- THE ESTIMATION OF INTERPHASESPERIODDURATION OF COLLECTION SWEET PEPPER SAMPLES IN GREENHOUSES
- Maine aspects teaching clinical pharmacy to pharmacists on postgraduate education
- Achieving High Throughput of Steganography & Steganalysis for Concealing images Information Using Buffers Concept
- Ratio of types of emotional maturity to the data on susceptibility to deception when using a polygraph method in psychology
Last modified: 2016-07-02 17:59:07