Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net

As computer and network security threats become more sophisticated and the number of service dependencies is increasing, optimal response decision is becoming a challenging task for security administrators. They should deploy and implement proper network security policy enforcement mechanisms in order to apply the appropriate countermeasures and defense strategy.

[1]  M.A. Prieto Portillo,et al.  VQ Digital Video Transmission through Coaxial Cable using OFDM , 2005, IEEE Latin America Transactions.

[2]  Yong Xiao,et al.  Verifying web services composition based on hierarchical colored petri nets , 2005, IHIS '05.

[3]  Johnny S. Wong,et al.  A taxonomy of intrusion response systems , 2007, Int. J. Inf. Comput. Secur..

[4]  Nora Cuppens-Boulahia,et al.  A Service Dependency Modeling Framework for Policy-Based Response Enforcement , 2009, DIMVA.

[5]  Nora Cuppens-Boulahia,et al.  Service Dependencies in Information Systems Security , 2010, MMM-ACNS.

[6]  Computer Network Security , 2005 .

[7]  Hervé Debar,et al.  The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.

[8]  Haiping Xu,et al.  A petri net based XML firewall security model for web services invocation , 2006, Communication, Network, and Information Security.

[9]  Nora Cuppens-Boulahia,et al.  A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.

[10]  Vijay Gehlot,et al.  An introduction to systems modeling and simulation with Colored Petri Nets , 2010, Proceedings of the 2010 Winter Simulation Conference.

[11]  A. Gatto,et al.  ACTkit: A Framework for the Definition and Enforcement of Role, Content and Context-based Access Control Policies , 2012, IEEE Latin America Transactions.

[12]  Jorge Lobo,et al.  Policies for Distributed Systems and Networks , 2001, Lecture Notes in Computer Science.

[13]  Raouf Boutaba,et al.  Towards Extensible Policy Enforcement Points , 2001, POLICY.

[14]  Sushil Jajodia,et al.  Scalable Analysis of Attack Scenarios , 2011, ESORICS.

[15]  Bart Preneel,et al.  Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.

[16]  Vladimir Mulukha,et al.  Dynamic Firewall Configuration: Security System Architecture and Algebra of the Filtering Rules , 2011 .

[17]  Hervé Debar,et al.  Individual Countermeasure Selection Based on the Return On Response Investment Index , 2012, MMM-ACNS.

[18]  Johnny S. Wong,et al.  Intrusion response cost assessment methodology , 2009, ASIACCS '09.

[19]  Shigong Long Analysis of Concurrent Security Protocols Using Colored Petri Nets , 2009, 2009 International Conference on Networking and Digital Society.

[20]  C. A. Petri Communication with automata , 1966 .

[21]  Xiao-wei Chen,et al.  IPSec Modeling Based on Color Petri Nets , 2006, 2006 International Conference on Communications, Circuits and Systems.

[22]  Hervé Debar,et al.  HADEGA: A novel MPLS-based mitigation solution to handle network attacks , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).

[23]  Lars Michael Kristensen,et al.  Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.

[24]  Nora Cuppens-Boulahia,et al.  Cost Evaluation for Intrusion Response Using Dependency Graphs , 2009, 2009 International Conference on Network and Service Security.

[25]  Pavel Laskov,et al.  Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.

[26]  Gustavo Gonzalez Granadillo,et al.  Botnets: Lifecycle and Taxonomy , 2011, 2011 Conference on Network and Information Systems Security.

[27]  Ruoyu Wu,et al.  An Attack Modeling Based on Hierarchical Colored Petri Nets , 2008, 2008 International Conference on Computer and Electrical Engineering.

[28]  Michael Westergaard,et al.  CPN Tools for Editing, Simulating, and Analysing Coloured Petri Nets , 2003, ICATPN.

[29]  Charles Lakos,et al.  From Coloured Petri Nets to Object Petri Nets , 1995, Application and Theory of Petri Nets.

[30]  Yang Xu,et al.  Modeling and Analysis of Security Protocols Using Colored Petri Nets , 2011, J. Comput..

[31]  Wil M. P. van der Aalst,et al.  Applications and Theory of Petri Nets 2003 , 2003, Lecture Notes in Computer Science.

[32]  V. Zaborovsky,et al.  Access Control Model and Algebra of Firewall Rules , 2011 .

[33]  Vijay Atluri,et al.  Computer Security – ESORICS 2011 , 2011, Lecture Notes in Computer Science.

[34]  C. K. M. Lee,et al.  Application of hierarchical Colored Petri Net in Distributed Manufacturing network , 2010, 2010 IEEE International Conference on Industrial Engineering and Engineering Management.