Abstract
The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Drogseth, D., Hultquist, S., Nudler, J.: Network Performance Management: Three key technology challenges. Special Report (2004), http://www.statseeker.com
Magrath, S., Chiang, F., Markovits, S., Braun, R., Cuervo, F.: Autonomics in Telecommunications Service Activation. In: First International Workshop on Autonomic Communication for Evolvable Next Generation Networks (2005)
Konstantinou, A., Florissi, D., Yemini, Y.: Towards Self-Configuring Networks. In: DARPA Active Networks Conference and Exposition (DANCE 2002) (2002)
Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM systems journal 42(1) (2003)
Horn, P.: Autonomic Computing: IBM’s Perspective on the State of Information Technology (2001), http://www.research.ibm.com/autonomic/manifesto
Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer Society, Los Alamitos (2003)
Balasubramaniam, S., Barrett, K., Strassner, J., Donnelly, W., van der Meer, S.: Bio-inspired Policy Based Management (bioPBM) for Autonomic Communication Systems. In: 7th IEEE workshop on Policies for Distributed Systems and Networks (2006)
TMF: TMF 053: The NGOSS Technology Neutral Architecture (2005)
IBM. Policy Management for Autonomic Computing. IBM T.J. Watson Research Centre (2005)
Durham, D., et al.: The COPS (Common Open Policy Service) Protocol. RFC 2748 (2000)
Westerinen, A., Strassner, J.: Common Information Model (CIM) Core Model. DSP0111, version 2.4 (2000)
Parker, J.: FCAPS, TMN, ITIL: Three Key Ingerdients to Effictive IT Management. OpenWater Solutions (2005)
Rivest, R.L.: S-expressions. Technical report, Network Working Group (1997), Internet Draft: http://theory.lcs.mit.edu/rivest/sexp.txt
Common Criteria Project: Common criteria for information technology security evaluation version 2.1. Technical report, US NIST (1999)
Bistarelli, S.: Semirings for Soft Constraint Solving and Programming, vol. LNCS 2962. Springer, Heidelberg (2004)
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Solving and Optimization. J.ACM 44(2), 201–236 (1997)
TNI. Trusted computer system evaluation criteria: Trusted Network Interpretation. Technical report, National Computer Security Center, Red Book (1987)
Millen, J., Schwartz, M.: The cascading problem for interconnected networks. In: 4th Aerospace Computer Security Applications Conference. IEEE CS Press, Los Alamitos (1988)
Foley, S.N., Bistaelli, S., O’Sullivan, B., Herbert, J., Swart, G.: Multilevel security and the quality of protection. In: Proceedings of First Workshop on Quality of Protection, Como, Italy, vol. 23. Springer Advances in Information Security, Heidelberg (2006)
Horton, R., et al.: The cascade vulnerability problem. Journal of Computer Security 2(4), 279–290 (1993)
Swart, G., Aziz, B., Foley, S., Herbert, J.: Trading off security in a service oriented architecture. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 295–309. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Foley, S.N., Fitzgerald, W., Bistarelli, S., O’Sullivan, B., Foghlú, M.Ó. (2006). Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration. In: Parr, G., Malone, D., Ó Foghlú, M. (eds) Autonomic Principles of IP Operations and Management. IPOM 2006. Lecture Notes in Computer Science, vol 4268. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908852_15
Download citation
DOI: https://doi.org/10.1007/11908852_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47701-3
Online ISBN: 978-3-540-47702-0
eBook Packages: Computer ScienceComputer Science (R0)