A formal approach to verify completeness and detect anomalies in firewall security policies

TitreA formal approach to verify completeness and detect anomalies in firewall security policies
Publication TypeJournal Article
Year of Publication2015
AuthorsKhoumsi, Aa, Krombi, Wb, Erradi, Mb
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8930
Pagination221-236
Abstract

Security policies are a relevant solution to protect information systems from undue accesses. In this paper, we develop a formal and rigorous automata-based approach to design and analyze security policies. The interest of our approach is that it can be used as a common basis for analyzing several aspects of security policies, instead of using a distinct approach and formalism for studying each aspect. We first develop a procedure that synthesizes automatically an automaton which implements a given security policy. Then, we apply this synthesis procedure to verify completeness of security policies and detect several types of anomalies in security policies. We also study space and time complexities of the developed procedures. © Springer International Publishing Switzerland 2015.

URLhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84928524690&doi=10.1007%2f978-3-319-17040-4_14&partnerID=40&md5=af206fc0108d0632a452dcb6750e1fd1
DOI10.1007/978-3-319-17040-4_14
Revues: 

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:280,116
    Education - This is a contributing Drupal Theme
    Design by WeebPal.