Managing security in dynamic networks

Alexander V. Konstantinou, Yechiam Yemini, Sandeep Bhatt, S. Rajagopalan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper describes our initial steps towards self-configuring mechanisms for automating high-level security and service policies in dynamic networks. We build on the NESTOR system developed at Columbia University for instrumenting and monitoring constraints on network elements and services such as DHCP, DNS zones, host-based access controls, firewalls, and VLAN switches. Current paradigms for configuration management require that changes be propagated either manually or via low-level scripts suited to static networks. Our longer-term goal is to provide fully automated techniques which work for dynamic networks in which changes are frequent and often unanticipated. Automated approaches, such as ours, are the only viable solution for global and dynamic networks and services. In this paper, we focus on one specific scenario to illustrate our ideas: providing transparent and secure access to selected services from a mobile laptop. The challenge is that reconfiguration must satisfy the security policies of two independent corporate networks.

Original languageEnglish
Title of host publicationProceedings of the 13th Conference on Systems Administration, LISA 1999
Pages109-121
Number of pages13
ISBN (Electronic)1880446251, 9781880446256
StatePublished - 1999
Event13th Systems Administration Conference, LISA 1999 - Seattle, United States
Duration: 7 Nov 199912 Nov 1999

Publication series

NameProceedings of the 13th Conference on Systems Administration, LISA 1999

Conference

Conference13th Systems Administration Conference, LISA 1999
Country/TerritoryUnited States
CitySeattle
Period7/11/9912/11/99

Fingerprint

Dive into the research topics of 'Managing security in dynamic networks'. Together they form a unique fingerprint.

Cite this