Skip to main navigation Skip to search Skip to main content

A formal approach for network security management based on qualitative risk analysis

  • Mohammad Ashiqur Rahman
  • , Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

The risk analysis is an important process for enforcing and strengthening efficient and effective security. Due to the significant growth of the Internet, application services, and associated security attacks, information professionals face challenges in assessing risk of their networks. The assessment of risk may vary with the enterprise's requirements. Hence, a generic risk analysis technique is suitable. Moreover, configuring a network with correct security policy is a difficult problem. The assessment of risk aids in realizing necessary security policy. Risk is a function of security threat and impact. Security threats depend on the traffic reachability. Security devices like firewalls are used to selectively allow or deny traffic. However, the connection between the network risk and the security policy is not easy to establish. A small modification in the network topology or in the security policy, can change the risk significantly. It is hard to manually follow a systematic process for configuring the network towards security hardening. Hence, an automatic generation of proper security controls, e.g., firewall rules and host placements in the network topology, is crucial to keep the overall security risk low. In this paper, we first present a declarative model for the qualitative risk analysis. We consider transitive reachability, i.e., reachability considering one or more intermediate hosts, in order to compute exposure of vulnerabilities. Next, we formalize our risk analysis model and the security requirements as a constraint satisfaction problem using the satisfiability modulo theories (SMT). A solution to the problem synthesizes necessary firewall policies and host placements. We also evaluate the scalability of the proposed risk analysis technique as well as the synthesis model.

Original languageEnglish
Title of host publicationProceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013
Pages244-251
Number of pages8
StatePublished - 2013
Externally publishedYes
Event2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013 - Ghent, Belgium
Duration: 27 May 201331 May 2013

Publication series

NameProceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013

Conference

Conference2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013
Country/TerritoryBelgium
CityGhent
Period27/05/1331/05/13

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A formal approach for network security management based on qualitative risk analysis'. Together they form a unique fingerprint.

Cite this