Automatic translation and enforcement of cybersecurity policies using a high-level definition language

Rivera Pinto, Diego and Monje Real, Fernando and Villagrá González, Víctor Abraham and Vega Barbas, Mario and Larriva Novo, Xavier Andrés and Berrocal Colmenarejo, Julio José (2019). Automatic translation and enforcement of cybersecurity policies using a high-level definition language. "Entropy", v. 21 (n. 1180); pp. 1-20. ISSN 1099-4300. https://doi.org/10.3390/e21121180.

Description

Title: Automatic translation and enforcement of cybersecurity policies using a high-level definition language
Author/s:
  • Rivera Pinto, Diego
  • Monje Real, Fernando
  • Villagrá González, Víctor Abraham
  • Vega Barbas, Mario
  • Larriva Novo, Xavier Andrés
  • Berrocal Colmenarejo, Julio José
Item Type: Article
Título de Revista/Publicación: Entropy
Date: December 2019
ISSN: 1099-4300
Volume: 21
Subjects:
Freetext Keywords: cybersecurity; security policies; automatic response systems; firewalls; risk assessment
Faculty: E.T.S.I. Telecomunicación (UPM)
Department: Ingeniería de Sistemas Telemáticos [hasta 2014]
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img]
Preview
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (809kB) | Preview

Abstract

The increasing number of cyber-attacks, their potential destructive capabilities, and the enormous threat they pose for organizations, require the constant design and development of new, faster, and easier to use systems to address them. The automation of security enforcement systems is one of the most important techniques for enabling a fast response to security challenges, but the complexity of security management might hinder the successful achievement of the desired security. Our proposal integrates the automatic enforcement of security rules based on intrusion detection systems with the definition of a high-level user-centered language for the definition of policies. We have designed a translation process from this language to specific network-wise and device-aware rules that can be installed and enforced. The deployment of these rules is determined by an automatic risk assessment process ruled by the detection system monitoring the network. This way, both the automation and easiness of use goals can be achieved using an integrated system. The solution was tested and validated in two different virtualized networks.

More information

Item ID: 63677
DC Identifier: http://oa.upm.es/63677/
OAI Identifier: oai:oa.upm.es:63677
DOI: 10.3390/e21121180
Official URL: https://www.mdpi.com/1099-4300/21/12/1180
Deposited by: Memoria Investigacion
Deposited on: 27 Sep 2020 08:52
Last Modified: 27 Sep 2020 08:52
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM