Please use this identifier to cite or link to this item: http://hdl.handle.net/2440/108423
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: Verifiable policy-defined networking for security management
Author: Ranathunga, D.
Roughan, M.
Kernick, P.
Falkner, N.
Nguyen, H.
McClintock, M.
Mihailescu, M.
Citation: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016 / vol.4, pp.344-351
Publisher: SCITEPRESS
Issue Date: 2016
ISBN: 9789897581960
Conference Name: 13th International Joint Conference on e-Business and Telecommunications (ICETE) (26 Jul 2016 - 28 Jul 2016 : Lisbon, Portugal)
Statement of
Responsibility: 
Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen, Marian Mihailescu, Michelle McClintock
Abstract: A common goal in network-management is security. Reliable security requires confidence in the level of protection provided. But, many obstacles hinder reliable security management; most prominent is the lack of built-in verifiability in existing management paradigms. This shortfall makes it difficult to provide assurance that the expected security outcome is consistent pre- and post-deployment. Our research tackles the problem from first principles: we identify the verifiability requirements of robust security management, evaluate the limitations of existing paradigms and propose a new paradigm with verifi- ability built in: Formally-Verifiable Policy-Defined Networking (FV-PDN). In particular, we pay attention to firewalls which protect network data and resources from unauthorised access. We show how FV-PDN can be used to configure firewalls reliably in mission critical networks to protect them from cyber attacks.
Keywords: Security policy; Zone-Conduit model; SCADA security; Security management.
Rights: Copyright © 2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
RMID: 0030059715
DOI: 10.5220/0005990303440351
Grant ID: http://purl.org/au-research/grants/arc/LP100200493
Published version: http://www.informatik.uni-trier.de/~ley/db/conf/secrypt/secrypt2016.html
Appears in Collections:Mathematical Sciences publications

Files in This Item:
File Description SizeFormat 
RA_hdl_108423.pdfRestricted Access158.4 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.