In the discipline of computer security, the field of trust management design is dedicated to the design of trusted systems, in particular trusted networks. One common trusted mechanism used these days is the multi-level security (MLS) mechanism, that allows simultaneous access to systems by users with different levels of security clearance in an interconnected network. Vulnerability arises when an intruder takes advantage of the network connectivity and creates an inappropriate flow of information across the network, leading to the so-called cascade vulnerability problem (CVP). In this article, we extend an existent approach to this problem proposed by Bistarelli et al. [1] that models, detects and properly eliminates the CVP in a network. This particular approach expresses a solution of the problem using constraint programming. We incorporate real-world criteria to consider into this approach, such as the bandwidth, electricity, cost of connections. Considering such features in CVP results in generating a constraint optimization problem.

An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem

Bistarelli S;
2007

Abstract

In the discipline of computer security, the field of trust management design is dedicated to the design of trusted systems, in particular trusted networks. One common trusted mechanism used these days is the multi-level security (MLS) mechanism, that allows simultaneous access to systems by users with different levels of security clearance in an interconnected network. Vulnerability arises when an intruder takes advantage of the network connectivity and creates an inappropriate flow of information across the network, leading to the so-called cascade vulnerability problem (CVP). In this article, we extend an existent approach to this problem proposed by Bistarelli et al. [1] that models, detects and properly eliminates the CVP in a network. This particular approach expresses a solution of the problem using constraint programming. We incorporate real-world criteria to consider into this approach, such as the bandwidth, electricity, cost of connections. Considering such features in CVP results in generating a constraint optimization problem.
2007
Istituto di informatica e telematica - IIT
Marek Reformat, Michael R. Berthold
Annual Meeting of the North-American-Fuzzy-Information-Processing-Society (NAFIPS)
372
377
6
IEEE
New York
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
24-27 June 2007
San Diego, CA, USA
Computer network management
Computer science
Constraint optimization
3
none
Bistarelli, S; Servin, C; Ceberio, M
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/75872
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 1
social impact