Misconfiguration Analysis of Network Access Control Policies
Network access control (NAC) systems have a very important role in network security. However, NAC policy configuration is an extremely complicated and error-prone task due to the semantic complexity of NAC policies and the large number of rules that could exist. This significantly increases the poss...
Main Author: | |
---|---|
Language: | en |
Published: |
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/4285 |
id |
ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-4285 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-LACETR-oai-collectionscanada.gc.ca-OWTU.10012-42852013-10-04T04:09:07ZTran, Tung2009-02-20T14:46:05Z2009-02-20T14:46:05Z2009-02-20T14:46:05Z2009-02-16http://hdl.handle.net/10012/4285Network access control (NAC) systems have a very important role in network security. However, NAC policy configuration is an extremely complicated and error-prone task due to the semantic complexity of NAC policies and the large number of rules that could exist. This significantly increases the possibility of policy misconfigurations and network vulnerabilities. NAC policy misconfigurations jeopardize network security and can result in a severe consequence such as reachability and denial of service problems. In this thesis, we choose to study and analyze the NAC policy configuration of two significant network security devices, namely, firewall and IDS/IPS. In the first part of the thesis, a visualization technique is proposed to visualize firewall rules and policies to efficiently enhance the understanding and inspection of firewall configuration. This is implemented in a tool called PolicyVis. Our tool helps the user to answer general questions such as ‘‘Does this policy satisfy my connection/security requirements’’. If not, the user can detect all misconfigurations in the firewall policy. In the second part of the thesis, we study various policy misconfigurations of Snort, a very popular IDS/IPS. We focus on the misconfigurations of the flowbits option which is one of the most important features to offers a stateful signature-based NIDS. We particularly concentrate on a class of flowbits misconfiguration that makes Snort susceptible to false negatives. We propose a method to detect the flowbits misconfiguration, suggest practical solutions with controllable false positives to fix the misconfiguration and formally prove that the solutions are complete and sound.enfirewallintrusion detection systemMisconfiguration Analysis of Network Access Control PoliciesThesis or DissertationSchool of Computer ScienceMaster of MathematicsComputer Science |
collection |
NDLTD |
language |
en |
sources |
NDLTD |
topic |
firewall intrusion detection system Computer Science |
spellingShingle |
firewall intrusion detection system Computer Science Tran, Tung Misconfiguration Analysis of Network Access Control Policies |
description |
Network access control (NAC) systems have a very important role in network security. However,
NAC policy configuration is an extremely complicated and error-prone task due to the semantic
complexity of NAC policies and the large number of rules that could exist. This significantly
increases the possibility of policy misconfigurations and network vulnerabilities. NAC policy
misconfigurations jeopardize network security and can result in a severe consequence such as
reachability and denial of service problems. In this thesis, we choose to study and analyze the NAC
policy configuration of two significant network security devices, namely, firewall and IDS/IPS.
In the first part of the thesis, a visualization technique is proposed to visualize firewall rules and
policies to efficiently enhance the understanding and inspection of firewall configuration. This is
implemented in a tool called PolicyVis. Our tool helps the user to answer general questions such as
‘‘Does this policy satisfy my connection/security requirements’’. If not, the user can detect all
misconfigurations in the firewall policy.
In the second part of the thesis, we study various policy misconfigurations of Snort, a very popular
IDS/IPS. We focus on the misconfigurations of the flowbits option which is one of the most important
features to offers a stateful signature-based NIDS. We particularly concentrate on a class of flowbits
misconfiguration that makes Snort susceptible to false negatives. We propose a method to detect the
flowbits misconfiguration, suggest practical solutions with controllable false positives to fix the
misconfiguration and formally prove that the solutions are complete and sound. |
author |
Tran, Tung |
author_facet |
Tran, Tung |
author_sort |
Tran, Tung |
title |
Misconfiguration Analysis of Network Access Control Policies |
title_short |
Misconfiguration Analysis of Network Access Control Policies |
title_full |
Misconfiguration Analysis of Network Access Control Policies |
title_fullStr |
Misconfiguration Analysis of Network Access Control Policies |
title_full_unstemmed |
Misconfiguration Analysis of Network Access Control Policies |
title_sort |
misconfiguration analysis of network access control policies |
publishDate |
2009 |
url |
http://hdl.handle.net/10012/4285 |
work_keys_str_mv |
AT trantung misconfigurationanalysisofnetworkaccesscontrolpolicies |
_version_ |
1716600148668186624 |