access control model based on OrBAC (Kalam et al.,
2003). As a result, an abstract security policy, which
is free of ambiguities, redundancies or unnecessary
details, is automatically transformed into specific se-
curity devices configurations. This strategy not only
simplifies the security administrator’s job, but also
guarantees that the resulting configuration is free of
anomalies and/or inconsistencies. The complete set of
algorithms and processes presented in this paper have
been implemented in a first software prototype, and
the results of a first evaluation have been overviewed.
Such implementation demonstrates the practicability
of our work and its performance results allow us to be
very optimistic about its use in more complex security
policy scenarios.
As work in progress, we are actually studying how
to extend our approach in the case where the security
architecture includes IPv6 devices. More specifically,
the construction of new VPN tunnels (e.g., IPv6-over-
IPv4) for IPv6 networks must be revised, and more
investigation has to be done in order to extend the
approach presented in this paper. In parallel to this
work, we are also extending our approach to make
cooperate routing and tunneling policies.
REFERENCES
Abou el Kalam, A., Baida, R. E., Balbiani, P., Benferhat,
S., Cuppens, F., Deswarte, Y., Mi
`
ege, A., Saurel, C.,
and Trouessin, G. Organization Based Access Con-
trol. In IEEE 4th Intl. Workshop on Policies for Dis-
tributed Systems and Networks, pp. 120–131, Lake
Come, Italy, 2003.
Abou el Kalam, A., Briffaut, J., Toinard, C., and Blanc, M.
Intrusion detection and security policy framework for
distributed environments. In Collaborative Technolo-
gies and Systems, pp.100-106, Missouri, USA, 2005.
Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N.
Towards Filtering and Alerting Rule Rewriting on
Single-Component Policies. In Intl. Conference on
Computer Safety, Reliability, and Security, pp. 182–
194, Poland, 2006.
Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Anal-
ysis of Policy Anomalies on Distributed Network Se-
curity Setups. In 11th European Symposium On Re-
search In Computer Security, pp. 496–511, Germany,
2006.
Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Ag-
gregating and Deploying Network Access Control
Policies. In 1rst Symposium on Frontiers in Avail-
ability, Reliability and Security (FARES), 2nd Interna-
tional Conference on Availability, Reliability and Se-
curity (ARES2007), Vienna, Austria, 2007.
Al-Shaer, E. S., Hamed, H. H., and Masum, H. Con-
flict Classification and Analysis of Distributed Fire-
wall Policies. In IEEE Journal on Selected Areas in
Communications, 23(10):2069–2084, 2005.
Bartal, Y., Mayer, A., Nissim, K., and Wool, A. Firmato:
A novel firewall management toolkit. In IEEE Sym-
posium on Security and Privacy, pp. 17–31, Oakland,
California, 1999.
Blanc, M., Clemente, P., Courtieu, P., Franche, S., Oudot,
L., Toinard, C. and Vessiller, L. Hardening large-
scale networks security through a meta-policy frame-
work. In Third Workshop on the Internet, Telecommu-
nications and Signal Processing, Adelaide, Australia,
2004.
Cisco Systems, Inc. Cisco Security Manager Prod-
uct Information. [Online]. Available from:
http://cisco.com/go/csmanager
Cuppens, F., Cuppens-Boulahia, N., and Miege, A. Inher-
itance hierarchies in the OrBAC Model and applica-
tion in a network environment. In 2nd Foundations of
Computer Security Workshop (FCS’04), Turku, Fin-
lande, 2004.
Cuppens, F., Cuppens-Boulahia, N., and Ben Ghorbel,
M. High-level conflict management strategies in ad-
vanced access control models. In Workshop on Infor-
mation and Computer Security (ICS 2006), Timisoara,
Roumania, 2006.
Cuppens, F., Cuppens-Boulahia, N., Sans, T. and Miege, A.
A formal approach to specify and deploy a network
security policy. In 2nd Workshop on Formal Aspects
in Security and Trust, pp. 203–218, Toulouse, France,
2004.
Fu, Z., Wu, S. F., Huang, H., Loh, K., Gong, F., Baldine, I.,
Xu, C. IPSec/VPN Security Policy: Correctness, Con-
flict Detection and Resolution. In Policy 2001 Work-
shop, pp. 39–56, 2001.
Hamed, H. H. and Al-Shaer, E. S. Taxonomy of conflicts in
network security policies. In IEEE Communications,
44(3):134-141, 2006.
Hassan, A. and Hudec, L. Role Based Network Security
Model: A Forward Step towards Firewall Manage-
ment. In Workshop On Security of Information Tech-
nologies, Algiers, 2003.
MITRE Corp. Common Vulnerabilities and Exposures.
[Online]. Available from:
http://cve.mitre.org/
Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C.
E. Role-Based Access Control Models. IEEE Com-
puter, 29(2):38–47, 1996.
Welte, H., Kadlecsik, J., Josefsson, M., McHardy, P., and
et al. The netfilter project: firewalling, nat and packet
mangling for linux 2.4x and 2.6.x. [Online]. Available
from:
http://www.netfilter.org/
RELIABLE PROCESS FOR SECURITY POLICY DEPLOYMENT
15