supports Approach 3 which means that it indirectly
earns the high score of aspect 1 in Table 1. In addi-
tion, the fixed strategy of deriving the disjoint patterns
accompanied by their affiliation to the block or al-
low actions mitigates the Transformation Issue. Nev-
ertheless, it should be noted that a reverse transfor-
mation has not been analysed. This and the fact that
still a configuration-language specific transformation
is needed once for every language is the reason why
the approach does not get allocated the high score re-
garding aspects 5 and 6 in Table 1.
Stateful control and filtering configurations are cur-
rently ignored by our implementations. In future work
we will analyse to what extend they should be part of
the effective configuration, resp. linked to it.
6 CONCLUSION
This paper discusses approaches for modelling net-
work access control configuration for security analy-
sis, identifies issues and proposes an alternative ap-
proach solving these issues. For this, the effective
configuration of rule chains is derived and modelled
in a configuration-language-agnostic way. The paper
shows that the approach does not suffer from scala-
bility problems, since the model is created once and
generic model extensions and analyses can be ap-
plied to it. The effective configuration represents all
protocol-specific patterns that can trigger actions in a
rule chain. Therefore, it expresses all network-level
effects of the configuration and, if used with a model
of the rule chain, can even provide inference of a set
of rules responsible for an identified problem. There-
fore, the effective configuration approach is an im-
provement over existing approaches and, moreover,
can be used in combination with them.
ACKNOWLEDGEMENTS
This work has been funded by the Federal Ministry
of Education and Research (BMBF, Germany) in the
project AICAS (project number 16KIS1063K).
REFERENCES
Cordova, R. F., Marcovich, A. L., and Santivanez, C. A.
(2018). An Efficient Method for Ontology-Based
Multi-Vendor Firewall Misconfiguration Detection: A
Real-Case Study. In Cely Callejas, J. D., editor, 2018
IEEE ANDESCON, pages 1–3, [Piscataway, New Jer-
sey]. IEEE.
Davy, S., Barron, J., Shi, L., Butler, B., Jennings, B.,
Griffin, K., and Collins, K. (2013). A language
driven approach to multi-system access control. 2013
IFIP/IEEE International Symposium on Integrated
Network Management (IM 2013), pages 1004–1008.
Fitzgerald, W. M., Foley, S. N., and Foghl
´
u, M.
´
O. (2008).
Network access control interoperation using semantic
web techniques. In WOSIS, pages 26–37.
Fitzgerald, W. M., Foley, S. N., Foghl
´
u, M.
´
O., et al.
(2009). Network access control configuration man-
agement using semantic web techniques. Journal
of Research and Practice in Information Technology,
41(2):99.
Fitzgerald, W. M., Foley, S. N., and O’Foghlu, M. (2007).
Confident firewall policy configuration management
using description logic. In 12th Nordic Workshop on
Secure IT Systems, pages 11–12.
Foley, S. N. and Fitzgerald, W. M. (2008). Semantic web
and firewall alignment. In 2008 IEEE 24th Inter-
national Conference on Data Engineering Workshop,
pages 447–453.
Gruber, T. R. (1993). A translation approach to portable
ontology specifications. Knowledge Acquisition,
5(2):199–220.
Hu, H., Ahn, G.-J., and Kulkarni, K. (15.10.2011 -
18.10.2011). Ontology-based policy anomaly man-
agement for autonomic computing. In Proceedings
of the 7th International Conference on Collaborative
Computing: Networking, Applications and Workshar-
ing. IEEE.
Khelf, R. and Ghoualmi-Zine, N. (26.11.2018 -
27.11.2018). Ipsec/firewall security policy anal-
ysis: A survey. In 2018 International Conference on
Signal, Image, Vision and their Applications (SIVA),
pages 1–7. IEEE.
Mart
´
ınez P
´
erez, G., Garc
´
ıa Clemente, F. J., and G
´
omez
Skarmeta, A. F. (2007). Managing semantic–aware
policies in a distributed firewall scenario. Internet Re-
search, 17(4):362–377.
O’Connor, M. and Das, A. (2009). SQWRL: A Query
Language for OWL. In Proceedings of the 6th In-
ternational Conference on OWL: Experiences and Di-
rections - Volume 529, OWLED’09, pages 208–215,
Aachen, DEU. CEUR-WS.org.
Patzer, F., Volz, F., Usl
¨
ander, T., Blocher, I., and Beyerer, J.
(2019). The industrie 4.0 asset administration shell as
information source for security analysis. In 2019 24th
IEEE International Conference on Emerging Tech-
nologies and Factory Automation (ETFA), pages 420–
427. IEEE.
Textor, A., Stynes, J., and Kroeger, R. (2010). Transfor-
mation of the common information model to owl. In
Current trends in web engineering, Lecture Notes in
Computer Science SL 3, Information Systems and Ap-
plication, incl. Internet/Web and HCI, pages 163–174,
Berlin. SpringerLink.
Tong, W., Liang, X., Li, X., Zhao, J., and Liang, X.
(2015). An analysis method of nac configuration con-
flict based on ontology. In Proc. of the 3rd Interna-
tional Conference on Digital Enterprise and Informa-
tion Systems (DEIS2015), page 46.
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
557