TY - JOUR
T1 - A soft constraint-based approach to the cascade vulnerability problem
AU - Bistarelli, Stefano
AU - Foley, Simon N.
AU - O'Sullivan, Barry
PY - 2005
Y1 - 2005
N2 - The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how constraint satisfaction provides a natural approach to expressing the necessary constraints to ensure multilevel security across a network configuration. In particular, soft constraints are used to detect and eliminate the cascading network paths that compromise security. Taking this approach results in practical advancements over existing solutions to this problem. In particular, constraint satisfaction highlights the set of all cascading paths, which we can eliminate in polynomial time by breaking a minimal number of system links to ensure security.
AB - The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how constraint satisfaction provides a natural approach to expressing the necessary constraints to ensure multilevel security across a network configuration. In particular, soft constraints are used to detect and eliminate the cascading network paths that compromise security. Taking this approach results in practical advancements over existing solutions to this problem. In particular, constraint satisfaction highlights the set of all cascading paths, which we can eliminate in polynomial time by breaking a minimal number of system links to ensure security.
UR - https://www.scopus.com/pages/publications/28844454313
U2 - 10.3233/JCS-2005-13502
DO - 10.3233/JCS-2005-13502
M3 - Article
AN - SCOPUS:28844454313
SN - 0926-227X
VL - 13
SP - 699
EP - 720
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 5
ER -