Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3411505.3418439acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks

Published: 09 November 2020 Publication History

Abstract

Data confidentiality, integrity and authentication are security properties which are often enforced with the generation of secure channels, such as Virtual Private Networks, over unreliable network infrastructures. Traditionally, the configuration of the systems responsible of encryption operations is performed manually. However, the advent of software-based paradigms, such as Software-Defined Networking and Network Functions Virtualization, has introduced new arms races. In particular, even though network management has become more flexible, the increased complexity of virtual networks is making manual operations unfeasible and leading to errors which open the path to a large number of cyber attacks. A possible solution consists in reaching a trade-off between flexibility and complexity, by automatizing the configuration of the channel protection systems through policy refinement. In view of these considerations, this paper proposes a preliminary study for an innovative methodology to automatically allocate and configure channel protection systems in virtualized networks. The proposed approach would be based on the formulation of a MaxSMT problem and it would be the first to combine automation, formal verification and optimality in a single technique.

Supplementary Material

MP4 File (3411505.3418439.mp4)
Data confidentiality, integrity and authentication are often enforced with the generation of secure channels over unreliable network infrastructures. Traditionally, the configuration of the systems responsible of encryption operations is performed manually. However, the advent of software-based paradigms has introduced new arms races. Even though network management has become more flexible, the increased complexity of virtual networks is making manual operations unfeasible and unsafe. A possible solution consists in reaching a trade-off between flexibility and complexity, by automatizing the configuration of the channel protection systems through policy refinement. Therefore, this paper proposes a preliminary study for a methodology to automatically configure channel protection systems in virtual networks. The proposed approach would be based on the formulation of a MaxSMT problem and it would be the first to combine automation, formal verification and optimality in a single technique.

References

[1]
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, and Alessandra Russo. 2009. Using argumentation logic for firewall configuration management. In 11th IFIP/IEEE International Symposium on Integrated Network Management, Long Island, NY, USA, June 1-5, 2009. 180--187. https://doi.org/10.1109/INM.2009.5188808
[2]
Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. 2004. Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst., Vol. 22, 4 (2004), 381--420. https://doi.org/10.1145/1035582.1035583
[3]
Cataldo Basile, Daniele Canavese, Antonio Lioy, and Fulvio Valenza. 2014. Inter-technology Conflict Analysis for Communication Protection Policies. In Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 8924). Springer, 148--163. https://doi.org/10.1007/978-3-319-17127-2_10
[4]
Cataldo Basile, Fulvio Valenza, Antonio Lioy, Diego R. Lopez, and Antonio Pastor Perales. 2019. Adding Support for Automatic Enforcement of Security Policies in NFV Networks. IEEE/ACM Trans. Netw., Vol. 27, 2 (2019), 707--720. https://doi.org/10.1109/TNET.2019.2895278
[5]
Padmalochan Bera, Soumya Kanti Ghosh, and Pallab Dasgupta. 2010. Policy Based Security Analysis in Enterprise Networks: A Formal Approach. IEEE Trans. Network and Service Management, Vol. 7, 4 (2010), 231--243. https://doi.org/10.1109/TNSM.2010.1012.0365
[6]
Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, and Jalolliddin Yusupov. 2020. Automated optimal firewall orchestration and configuration in virtualized networks. In NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020. IEEE, 1--7. https://doi.org/10.1109/NOMS47738.2020.9110402
[7]
Chi-Lan Chang, Yun-Peng Chiu, and Chin-Laung Lei. 2005. Automatic Generation of Conflict-Free IPsec Policies. In Formal Techniques for Networked and Distributed Systems - FORTE 2005, 25th IFIP WG 6.1 International Conference, Taipei, Taiwan, October 2-5, 2005, Proceedings. 233--246. https://doi.org/10.1007/11562436_18
[8]
Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin T. Vechev. 2017. Network-Wide Configuration Synthesis. In Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II. 261--281. https://doi.org/10.1007/978-3-319-63390-9_14
[9]
Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin T. Vechev. 2018. NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. In 15th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2018, Renton, WA, USA, April 9-11, 2018. 579--594. https://www.usenix.org/conference/nsdi18/presentation/el-hassany
[10]
Zhi Fu and Shyhtsun Felix Wu. 2001. Automatic Generation of IPSec/VPN Security Policies In an Intra-Domain Environment. In Operations & Management, 12th International Workshop on Distributed Systems, DSOM 2001, Nancy, France, October 15-17, 2001. Proceedings. 279--290.
[11]
Joaquín García-Alfaro, Frédé ric Cuppens, Nora Cuppens-Boulahia, and Stere Preda. 2010. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies. In Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers. 203--215. https://doi.org/10.1007/978-3-642-19348-4_15
[12]
John Govaerts, Arosha K. Bandara, and Kevin Curran. 2008. A formal logic approach to firewall packet filtering analysis and generation. Artif. Intell. Rev., Vol. 29, 3--4 (2008), 223--248. https://doi.org/10.1007/s10462-009-9147-0
[13]
Joshua D. Guttman. 1997. Filtering Postures: Local Enforcement for Global Policies. In 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA. 120--129. https://doi.org/10.1109/SECPRI.1997.601327
[14]
Joshua D. Guttman and Amy L. Herzog. 2005. Rigorous automated network security management. Int. J. Inf. Sec., Vol. 4, 1--2 (2005), 29--48. https://doi.org/10.1007/s10207-004-0052-x
[15]
Hazem H. Hamed, Ehab S. Al-Shaer, and Will Marrero. 2005. Modeling and Verification of IPSec and VPN Security Policies. In 13th IEEE International Conference on Network Protocols (ICNP 2005), 6-9 November 2005, Boston, MA, USA. 259--278. https://doi.org/10.1109/ICNP.2005.25
[16]
Wolfgang John, Guido Marchetto, Felician Né meth, Pontus Skö ldströ m, Rebecca Steinert, Catalin Meirosu, Ioanna Papafili, and Kostas Pentikousis. 2017. Service Provider DevOps. IEEE Commun. Mag., Vol. 55, 1 (2017), 204--211. https://doi.org/10.1109/MCOM.2017.1500803CM
[17]
Soumya Maity, Padmalochan Bera, and S. K. Ghosh. 2012. Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach. In International Symposium on Electronic System Design, ISEDs 2012, Kolkata, India, December 19--22, 2012. 314--318. https://doi.org/10.1109/ISED.2012.72
[18]
Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. 2016. Network Function Virtualization: State-of-the-Art and Research Challenges. IEEE Communications Surveys and Tutorials, Vol. 18, 1 (2016), 236--262. https://doi.org/10.1109/COMST.2015.2477041
[19]
Rajendra Patil and Chirag Modi. 2019. An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization. ACM Comput. Surv., Vol. 52, 1 (2019), 12:1--12:38. https://doi.org/10.1145/3287306
[20]
Dinesha Ranathunga, Matthew Roughan, Phil Kernick, and Nick Falkner. 2016. The Mathematical Foundations for Mapping Policies to Network Devices. In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), Lisbon, Portugal, July 26-28, 2016. 197--206. https://doi.org/10.5220/0005946201970206
[21]
Michael Rossberg, Guenter Schaefer, and Thorsten Strufe. 2010. Distributed Automatic Configuration of Complex IPsec-Infrastructures. J. Network Syst. Manage., Vol. 18, 3 (2010), 300--326. https://doi.org/10.1007/s10922-010-9168-7
[22]
Nicolas Stouls and Marie-Laure Potet. 2007. Security Policy Enforcement Through Refinement Process. In 7th International Conference of B Users, Besancc on, France, January 17--19, 2007, Proceedings. 216--231. https://doi.org/10.1007/11955757_18
[23]
F. Valenza, C. Basile, D. Canavese, and A. Lioy. 2017. Classification and Analysis of Communication Protection Policy Anomalies. IEEE/ACM Trans. Netw., Vol. 25, 5 (Oct 2017), 2601--2614. https://doi.org/10.1109/TNET.2017.2708096
[24]
Verizon. 2020. 2020 Data Breach Investigations Report.
[25]
Pavan Verma and Atul Prakash. 2005. FACE: A Firewall Analysis and Configuration Engine. In 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January - 4 February 2005, Trento, Italy. 74--81. https://doi.org/10.1109/SAINT.2005.28
[26]
Yanyan Yang, Zhi (Judy) Fu, and Shyhtsun Felix Wu. 2003. BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN. In IFIP/IEEE Eighth International Symposium on Integrated Network Management (IM 2003), March 24-28, 2003, Colorado Springs, USA. 231--244.
[27]
Yanyan Yang, Charles U. Martel, and Shyhtsun Felix Wu. 2004. On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies. In IEEE/IFIP Network Operations and Management Symposium, Seoul, Korea, 19-23 April 2004. 277--290. https://doi.org/10.1109/NOMS.2004.1317665

Cited By

View all
  • (2023)Automation for Network Security Configuration: State of the Art and Research TrendsACM Computing Surveys10.1145/361640156:3(1-37)Online publication date: 5-Oct-2023
  • (2023)Automating the configuration of firewalls and channel protection systems in virtual networks2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175466(474-479)Online publication date: 19-Jun-2023
  • (2023)Towards Security Automation in Virtual Networks2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175459(326-331)Online publication date: 19-Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CYSARM'20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race
November 2020
38 pages
ISBN:9781450380911
DOI:10.1145/3411505
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automation
  2. channel protection
  3. network functions virtualization
  4. network security optimization

Qualifiers

  • Short-paper

Funding Sources

  • EU H2020 Project ASTRID
  • EU H2020 Project CyberSec4Europe

Conference

CCS '20
Sponsor:

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)1
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Automation for Network Security Configuration: State of the Art and Research TrendsACM Computing Surveys10.1145/361640156:3(1-37)Online publication date: 5-Oct-2023
  • (2023)Automating the configuration of firewalls and channel protection systems in virtual networks2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175466(474-479)Online publication date: 19-Jun-2023
  • (2023)Towards Security Automation in Virtual Networks2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175459(326-331)Online publication date: 19-Jun-2023
  • (2023)A demonstration of VEREFOO: an automated framework for virtual firewall configuration2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175442(293-295)Online publication date: 19-Jun-2023
  • (2023)Security automation for multi-cluster orchestration in Kubernetes2023 IEEE 9th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft57336.2023.10175419(480-485)Online publication date: 19-Jun-2023
  • (2022)Optimal Access Control Deployment in Network Function VirtualizationNOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS54207.2022.9789911(1-9)Online publication date: 25-Apr-2022
  • (2021)A novel approach for security function graph configuration and deployment2021 IEEE 7th International Conference on Network Softwarization (NetSoft)10.1109/NetSoft51509.2021.9492654(457-463)Online publication date: 28-Jun-2021

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media