End-to-End Network Access Analysis

نویسندگان

  • Sruthi Bandhakavi
  • Sandeep Bhatt
  • Cat Okita
  • Prasad Rao
چکیده

© End-to-End Network Access Analysis Sruthi Bandhakavi, Sandeep Bhatt, Cat Okita, Prasad Rao HP Laboratories HPL-2008-28R1 No keywords available. Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, components along a path. Furthermore, configurations evolve over time, and a small change in one configuration file can have widespread impact on the end-to-end accesses. Short of exhaustive testing, which is prohibitively time consuming and impractical, there are no good solutions to analyze end-to-end flows from network configurations. This paper presents a technique to analyze all the end-to-end accesses from the configuration files of network routers and firewalls. The contributions of this paper are to engineer solutions for real network instances that are based on (i) generic templates for network components and (ii) a more general treatment of firewalls, including ways to deal with certain state-dependent filter rules, and (iii) efficient generation of firewall access control rules to meet desired end-to-end flow requirements. Our goal is to help network security engineers and operators quickly determine configuration errors that may cause unexpected access behavior. External Posting Date: November 21, 2008 [Fulltext] Approved for External Publication Internal Posting Date: November 21, 2008 [Fulltext] Copyright 2008 Hewlett-Packard Development Company, L.P. End-to-end Network Access Analysis Sruthi Bandhakavi∗, Sandeep Bhatt, Cat Okita†, Prasad Rao Hewlett-Packard Laboratories 5 Vaughn Drive Princeton, NJ 08540 Abstract Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the con gurations of multiple, separately administered, components along its path. Furthermore, congurations are constantly evolving, and a small change in one con guration le can have widespread impact on the end-to-end accesses. Short of exhaustive testing, which is prohibitively time consuming and impractical, there are no good solutions to analyze end-to-end ows from network con gurations. This paper presents a technique to analyze all the end-to-end accesses from the con guration les of network routers, switches and rewalls. Our goal is to help network security engineers and operators quickly determine con guration errors that may cause unexpected behavior such as unwanted accesses or unreachable services. Our technique can be also be used as part of the change management process, to help prevent network miscon guration. We build upon the work in [6], which presented an abstract formulation of the problem. The contributions of this paper are to engineer solutions for real network instances that are based on (i) generic templates for network components and (ii) a more general treatment of rewalls, including ways to deal with certain state-dependent lter rules, and (iii) e cient generation of rewall access control rules to meet desired end-to-end ow requirements.Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the con gurations of multiple, separately administered, components along its path. Furthermore, congurations are constantly evolving, and a small change in one con guration le can have widespread impact on the end-to-end accesses. Short of exhaustive testing, which is prohibitively time consuming and impractical, there are no good solutions to analyze end-to-end ows from network con gurations. This paper presents a technique to analyze all the end-to-end accesses from the con guration les of network routers, switches and rewalls. Our goal is to help network security engineers and operators quickly determine con guration errors that may cause unexpected behavior such as unwanted accesses or unreachable services. Our technique can be also be used as part of the change management process, to help prevent network miscon guration. We build upon the work in [6], which presented an abstract formulation of the problem. The contributions of this paper are to engineer solutions for real network instances that are based on (i) generic templates for network components and (ii) a more general treatment of rewalls, including ways to deal with certain state-dependent lter rules, and (iii) e cient generation of rewall access control rules to meet desired end-to-end ow requirements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Fault Identification using end-to-end data by imperialist competitive algorithm

Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...

متن کامل

Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenu...

متن کامل

The Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks

With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008