Policy Mining : a Bottom-Up Approach Toward Network Security Management. (Techniques de rôle mining pour la gestion de politiques de sécurité : application à l'administration de la sécurité réseau)

نویسنده

  • Safaà Hachana
چکیده

Today’s corporations rely entirely on their information systems, usually connected to the Internet. Network access control, mainly ensured by firewalls, has become a paramount necessity. Yet, the management of manually configured firewall rules is complex, error prone, and costly for large networks. Using high abstract models such as the Role Based Access Control (RBAC) model has proved to be e cient in the definition and management of access control policies. Recent interest in role mining, which is the bottom-up approach for automatic RBAC configuration from the already deployed authorizations, has promoted further the development of this model. This thesis is devoted to a bottom-up approach for the management of network security policies from high abstraction level with low cost and high confidence. Thus we show that the Network Role Based Access Control (Net-RBAC) model is more adapted to the specification of network access control policies than the RBAC model. We propose policy mining, a bottom-up approach that extracts from the deployed rules on a firewall the corresponding policy modeled with Net-RBAC. We devise a generic algorithm based on matrix factorization, that could adapt most of the existing role mining techniques to extract instances of Net-RBAC. Furthermore, knowing that the large and medium networks are usually protected by more than one firewall, we aim to provide a complete automatic bottom-up framework for network policy mining. We handle the problem of integration of Net-RBAC policies resulting from policy mining over several firewalls. We demonstrate how to verify security properties related to the deployment consistency over the firewalls in the meantime. Besides, our comprehensive analysis of research axes around role mining, enables us to note that literature lacks a clear basis for appraising and leveraging the learning outcomes of role mining process. In this thesis, we provide assistance tools for administrators to analyze role mining and policy mining results as well. We formally define the problem of comparing sets of roles and evidence that the problem is NP-complete. Then, we devise an algorithm that maps the inherent relationship between the sets based on Boolean expressions, and projects roles from one set into the other set. This

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modèle de sécurité pour le secteur de la santé

RESUME : Cet article propose un modèle de sécurité suffisamment général pour couvrir toute la diversité des systèmes d’information et de communication de la santé (SICS). L’un des objectifs de ce modèle est de favoriser l’interopérabilité de ces systèmes tout en étant suffisamment souple pour prendre en compte toute amélioration ou changement dans la politique de sécurité. Ce modèle réalise un ...

متن کامل

Modélisation de politiques de sécurité à l'aide de méthode de spécifications formelles. (Security policies modeling by using formal methods)

ion des données : on peut définir des actions plus abstraites que lecture/écriture. Le modèle RBAC modélise le système informatique considéré en séparant les entités actives des entités passives. Les entités actives correspondent aux utilisateurs du système et les entités passives correspondent aux objets du système. Au contraire du modèle de LaPadula, qui associe des niveaux de sécurité aux di...

متن کامل

Managing Security of Grid Architecture with a Grid Security Operation Center

Due to the nature of grid computing networks, security pitfalls are plethora and adversaries are sneaking to launch attacks. Keeping this scope in mind, we will discuss our proposed solution for securing grid computing networks that we have called gSOC (Grid Security Operation Center). The main advantage of gSOC is that it can give a global view of security of the entire grid infrastructure. Th...

متن کامل

Study and Development of a Symmetric protocol to secure communications in WSN

Résumé : Durant cette dernière décennie, les réseaux de capteurs sans fil (RCSF) ont attiré l’attention des chercheurs et des services de recherche et développement en raison de leur facilité de déploiement et de leur champs d’application dans divers domaines, y compris la sécurité et la surveillance, le contrôle, la maintenance des systèmes complexes, l’agriculture, e-santé, etc. Toutefois, en...

متن کامل

Safe and Efficient Strategies for Updating Firewall Policies

Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require automated tools providing a user-friendly environment to specify, configure and safely deploy a target policy. Much research has already addressed policy specification, conflict detection, and optimization but very little researc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014