Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/108423
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Type: | Conference paper |
Title: | Verifiable policy-defined networking for security management |
Author: | Ranathunga, D. Roughan, M. Kernick, P. Falkner, N. Nguyen, H. McClintock, M. Mihailescu, M. |
Citation: | Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016 / Callegari, C., VanSinderen, M., Sarigiannidis, P., Samarati, P., Cabello, E., Lorenz, P., Obaidat, M.S. (ed./s), vol.4, pp.344-351 |
Publisher: | SCITEPRESS |
Issue Date: | 2016 |
ISBN: | 9789897581960 |
Conference Name: | 13th International Joint Conference on e-Business and Telecommunications (ICETE) (26 Jul 2016 - 28 Jul 2016 : Lisbon, Portugal) |
Editor: | Callegari, C. VanSinderen, M. Sarigiannidis, P. Samarati, P. Cabello, E. Lorenz, P. Obaidat, M.S. |
Statement of Responsibility: | Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen, Marian Mihailescu, Michelle McClintock |
Abstract: | A common goal in network-management is security. Reliable security requires confidence in the level of protection provided. But, many obstacles hinder reliable security management; most prominent is the lack of built-in verifiability in existing management paradigms. This shortfall makes it difficult to provide assurance that the expected security outcome is consistent pre- and post-deployment. Our research tackles the problem from first principles: we identify the verifiability requirements of robust security management, evaluate the limitations of existing paradigms and propose a new paradigm with verifi- ability built in: Formally-Verifiable Policy-Defined Networking (FV-PDN). In particular, we pay attention to firewalls which protect network data and resources from unauthorised access. We show how FV-PDN can be used to configure firewalls reliably in mission critical networks to protect them from cyber attacks. |
Keywords: | Security policy; Zone-Conduit model; SCADA security; Security management. |
Rights: | Copyright © 2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved |
DOI: | 10.5220/0005990303440351 |
Grant ID: | http://purl.org/au-research/grants/arc/LP100200493 |
Published version: | http://dx.doi.org/10.5220/0005990303440351 |
Appears in Collections: | Aurora harvest 8 Mathematical Sciences publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RA_hdl_108423.pdf Restricted Access | Restricted Access | 158.4 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.