Analyzing end-to-end network reachability

Integrated Network Management(2009)

引用 11|浏览43
暂无评分
摘要
Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, components. As configurations evolve, a small change in one configuration file can have widespread impact on the end-to-end accesses. Short of exhaustive testing, which is impractical, there are no good solutions to analyze end-to-end flows from network configurations. This paper presents a general technique to analyze all the end-to-end accesses from the configuration files of network routers, switches and firewalls. We efficiently analyze certain state-dependent filter rules. Our goal is to help network security engineers and operators quickly determine configuration errors that may cause unexpected behavior such as unwanted accesses or unreachable services. Our technique can be also be used as part of the change management process, to help prevent network misconfiguration.
更多
查看译文
关键词
configuration error,end-to-end flow,network security engineer,network configuration,end-to-end network reachability,change management process,configuration file,network routers,network misconfiguration,end-to-end access,network security administrator,switches,testing,change management,information analysis,data mining,packet switching,filtering,routing protocols,ribs,routing,network security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要