Modelling and Analysing Network Security Policies in a Given Vulnerability Setting

نویسنده

  • Roland Rieke
چکیده

The systematic protection of critical information infrastructures requires an analytical process to identify the critical components and their interplay, to determine the threats and vulnerabilities, to assess the risks and to prioritise countermeasures where risk is unacceptable. This paper presents an integrated framework for model-based symbolic interpretation, simulation and analysis with a comprehensive approach focussing on the validation of network security policies. A graph of all possible attack paths is automatically computed from the model of an ICT network, of vulnerabilities, exploits and an attacker strategy. Constraints on this graph are given by a model of the network security policy. The impact of changes to security policies can be computed and visualised by finding differences in the attack graphs. A unique feature of the presented approach is, that abstract representations of these graphs can be computed that allow comparison of focussed views on the behaviour of the system. This guides optimal adaptation of the security policy to the given vulnerability setting.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A SOA-based Impact Analysis for Vulnerability Management in E-Government

This paper suggests a SOA-based system impact management for information assurance vulnerability in E-Government. Once an information assurance vulnerability notice is given for a system, it is important for reducing massive system engineering efforts for system impact management. When multiple systems are updated by security patches for mitigating system vulnerability, system impact management...

متن کامل

An Integrated Analysis of the Effect of Irrigation Efficiency Improvement on the Reliability and Vulnerability of Water Resources System with Regard to Discharge Fluctuations (A Case Study: Dez Basin)

Integrated simulation of water resources systems is an efficient tool to evaluate and adopt various options in macro-policies and decision-making procedures that are in line with the sustainable development of drainage basins. One of the drainage basin management policies is to enhance the efficiency of agricultural land use. Considering the complicated function of the drainage basin elements a...

متن کامل

Explaining of housing vulnerability in rural areas Case Study: Neyriz Township

Introduction Rural areas are more vulnerable to earthquake hazards than urban areas but the vulnerability of rural areas has always been neglected and few studies are worrying about it. Given the importance of villages and played the crucial role in socio-economic development and national security, providing adequate housing for villagers and addressing the problems in this area, in particular...

متن کامل

Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network

One of the factors that play a major role in information security is people. People are the drivers of most processes and procedures in information security. However, many researchers agree that human aspects are not given enough attention; more focus is given to the technical security. This is especially true in the security of the underlying network infrastructure which is often seen as a tec...

متن کامل

Personality and IT security: An application of the five-factor model

Despite numerous advances in IT security, many computer users are still vulnerable to security-related risks because they do not comply with organizational policies and procedures. In a network setting, individual risk can extend to all networked users. Endpoint security refers to the set of organizational policies, procedures, and practices directed at securing the endpoint of the network conn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006