Verification of the pocket filtering based on method of verification on the model

Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich
{"title":"Verification of the pocket filtering based on method of verification on the model","authors":"Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich","doi":"10.1109/ICISCT47635.2019.9011901","DOIUrl":null,"url":null,"abstract":"In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT47635.2019.9011901","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.
基于模型验证方法的口袋滤波验证
本文提出了一种过滤规则的验证方法,旨在检测和解决计算机网络安全策略规范中的过滤异常。该方法基于对模型的验证方法。该方法考虑了计算机系统模型、防火墙模型和过滤异常模型,为过滤规则的验证提供了依据。以及检测这种异常的算法。提出了一种基于这些模型的安全策略过滤规则验证技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信