Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations

Cornelius Diekmann, Andreas Korsten, Georg Carle

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

5 Zitate (Scopus)

Abstract

In network management, when it comes to security breaches, human error constitutes a dominant factor. We present our tool topoS which automatically synthesizes low-level network configurations from high-level security goals. The automation and a feedback loop help to prevent human errors. Except for a last serialization step, topoS is formally verified with Isabelle/HOL, which prevents implementation errors. In a case study, we demonstrate topoS by example. For the first time, the complete transition from high-level security goals to both firewall and SDN configurations is presented.

OriginalspracheEnglisch
TitelProceedings of the 11th International Conference on Network and Service Management, CNSM 2015
Redakteure/-innenEdmundo Roberto Mauro Madeira, Joan Serrat, Jurgen Schonwalder, Corinna Schmitt, Mauro Tortonesi
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers Inc.
Seiten366-371
Seitenumfang6
ISBN (elektronisch)9783901882777
DOIs
PublikationsstatusVeröffentlicht - 28 Dez. 2015
Veranstaltung11th International Conference on Network and Service Management, CNSM 2015 - Barcelona, Spanien
Dauer: 9 Nov. 201513 Nov. 2015

Publikationsreihe

NameProceedings of the 11th International Conference on Network and Service Management, CNSM 2015

Konferenz

Konferenz11th International Conference on Network and Service Management, CNSM 2015
Land/GebietSpanien
OrtBarcelona
Zeitraum9/11/1513/11/15

Fingerprint

Untersuchen Sie die Forschungsthemen von „Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren