Principles of secure network configuration: Towards a formal basis for self-configuration

  • Simon N. Foley
  • , William Fitzgerald
  • , Stefano Bistarelli
  • , Barry O'Sullivan
  • , Mícheál Ó Foghlú

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.

Original languageEnglish
Title of host publicationAutonomic Principles of IP Operations and Management - 6th IEEE International Workshop on IP Operations and Management, IPOM 2006, Proceedings
PublisherSpringer Verlag
Pages168-180
Number of pages13
ISBN (Print)3540477012, 9783540477013
DOIs
Publication statusPublished - 2006
Event6th IEEE International Workshop on IP Operations and Management, IPOM 2006 - Dublin, Ireland
Duration: 23 Oct 200625 Oct 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4268 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th IEEE International Workshop on IP Operations and Management, IPOM 2006
Country/TerritoryIreland
CityDublin
Period23/10/0625/10/06

Fingerprint

Dive into the research topics of 'Principles of secure network configuration: Towards a formal basis for self-configuration'. Together they form a unique fingerprint.

Cite this