Academia.eduAcademia.edu

Policy Based Security and Network Management in Computer Networks

2015

Computer networks are ubiquitous in nature with a plethora of networking models that are suited to different organizations. However, security has been a concern in such networks besides managing network effectively. Mostly network security is based on the needs of the organization which used the network for secure communications. However, the actual implementation of security is achieved by defining policies that guide the policy management tool to take expert decisions. The policies when defined perfectly, the security can be most effective. Network administrators depend on traditional tools that can be used to monitor happenings in the network. However, when there are plenty of messages in the reports and network administrators need time to analyze and made decisions, they cannot prevent damage that has been caused already. Therefore a real time approach is desired for both network management and security in computer networks. We believe that policy based security and network mana...

Policy Based Security and Network Management in Computer Networks Anupoju Venkata Malleswara Rao #1, Dr. Shaheda Akthar *2 # Ph. D. Scholar, Acharya Nagarjuna University, Nagarjuna Nagar, Guntur, Andhra Pradesh, India * Lecturer in Computer Science, Department of Computer Science Govt. College for Women, Guntur, Andhra Pradesh, India. Abstract Computer networks are ubiquitous in nature with a plethora of networking models that are suited to different organizations. However, security has been a concern in such networks besides managing network effectively. Mostly network security is based on the needs of the organization which used the network for secure communications. However, the actual implementation of security is achieved by defining policies that guide the policy management tool to take expert decisions. The policies when defined perfectly, the security can be most effective. Network administrators depend on traditional tools that can be used to monitor happenings in the network. However, when there are plenty of messages in the reports and network administrators need time to analyze and made decisions, they cannot prevent damage that has been caused already. Therefore a real time approach is desired for both network management and security in computer networks. We believe that policy based security and network management can help improve networks when the process is holistic and updated from time to time. This paper reviews literature that provides insights pertaining to policy based security and network management. Index Terms: Network, security, security policy, security management, policy management, network management. I. INTRODUCTION Over a period of time computer networks evolved and being used across the globe. Right from the first network invented after Second World War, computer networks witnessed many changes from wired networks to wireless networks (different topologies for each network). These networks, though they are different from each other, show a common requirement that is security. Since security plays a crucial role in computer networks, it is to be given highest www.ijmetmr.com/icecv2015 importance. Network security and network management are ever lasting issues that are to be addressed from time to time. Since the networks need to be protected, the automated applications need domain experts’ inputs for protecting systems. It does mean that security systems might need user inputs. In other words, the security related policies are to be defined by users so that the security mechanisms can work well as per the requirements of the users. Thus policy management came into existence. Security policies that are defined perfectly play a role in securing systems. No matter how good a security system is when policies are not defined correctly, it cannot guarantee fool proof security. In this paper we review the literature on policy based security and network management in computer networks. As computer networks became diversified into Wireless Sensor Network (WSN), Mobile Ad Hoc Network (MANET), Vehicular Ad Hoc Network (VANET), and so on, it became essential to have a review of different computer networks and what are the policy based approaches employed in securing such networks. Our contributions in the paper include the review of the present state-of-the-art of policy based security and network management. The remainder of the paper is structured as follows. Section II provides various aspects of management of policies in communication/computer networks. Section III presents security policies for computer networks. Section IV concludes the paper besides providing directions for future work. II. MANAGEMENT OF POLICIES According to Phanse, DaSilva [3] quality of Service (QoS) plays a vital role in computer networks. The network management here is required in order to handle network survivability, QoS robustness, and service differentiation. Policy based management is Page 1 one of the promising methods that can be used to leverage QoS and network management. The policy distribution models can be either outsourced to third parties or can be built into the framework of the network. Response time and signalling overhead can be used as measures for enhancing network management. A policy based system should realize a robust architecture. Figure 1 presents important architectural elements of a policy – based system. Fig. 2 Illustrates types of policy models [3] Fig.1 Overview of a policy-based system As shown in Figure 1, it is evident that policy management tool (PMT) allows network administrator to define and manage security policies over network. PMT is ideally used by network administrator to monitor network and take necessary steps. The problems if any in the network can be identified using the policy-based system. The PMT determines the relationships among policies and the need for updating policies from time to time [3]. There is Policy Decision Point (PDP) is derived from multiple Policy Enforcement Points (PEP). The PEP is responsible to enforce given policy in the network. The policy dynamics are monitored by PDP server. PDP actually monitors the PEPs in order to ensure that there is thorough understanding between making well informed decisions. PEP also aware of policy changes and reports the same to PDP. The PDP has access to a wealth of knowledge that resides in the policy repository. The policy management tool interacts with PDP in order to know the policy dynamics and take appropriate decision [3]. There are two major models pertaining to policies namely provisioning model and outsourcing model are presented in Figure 2. www.ijmetmr.com/icecv2015 As can be seen in Figure 2, it is evident that policies can be categorized into two models namely provisioning model and outsourcing model. In case of provisioning model, the local decisions are made on each PEP. However, the policies come from the PDP. On the contrary, the PDP takes decisions based on the request made by PEP. Therefore the outsourcing model is known as PEP-driven while the provisioning model is PDP driven. In case of provisioning the model is distributed in nature while the outsourcing model is centralized [3]. 2.1Policy Based Content Delivery Maclarty and Fry [4] explored active network architecture for policy – based content delivery. With respect to audio streaming to subscribers, it is possible to improve quality of service based on policies. Policy is nothing but the guidelines or rule sand regulations that are tailored towards a user of the network. Userbased policies and the policy based content delivery with respect to live streaming can help increase QoS in computer networks. The user-centric policies that are defined with mutual agreement with end users can provide service providers an edge in maintaining quality of services. This will result in customer satisfaction, ease of content delivery and optimization of services. In case of distributed applications, the policies might be maintained in a remote server which is contacted to process every request in order to ensure that the service quality is not deteriorated. Dini et al. [5] explored policy – enabled mechanisms for handling challenges, expectations, and feature interactions in computer networks. Page 2 2.2 Resources Allocation Policies An organization can achieve its strategic goals by assigning resources and managing them optimally. Resources include computing resources like storage, processing power, and so on. These sources can be allocated to increased number of users in a fashion that makes sense besides optimizing resource utilization. Gaining access to resources as per the privileges can also be integrated with resource allocation policies. It is also essential to monitor allocated resources using technologies. The technologies can also be used for ensuring security and controlling other applications and their user base with fool proof security and resource optimization. 2.3 Bandwidth Allocation Policies Network management also involves bandwidth allocation. Towards this end, the bandwidth allocation policies play a vital role in ensuring quality of services. In packet-switched networks Hou et al. [6] proposed two bandwidth allocation policies. They are generalized max-min (GMM) and Weight-Proportional Max Min (WPMM). Available Bit Rate (ABR) became a norm to plan data transfer in distributed applications. The rate allocation mechanisms are in general and they do not consider or impose any special requirements on scheduling and buffering schemes. The experiments proved that the rate based feedback control when employed yielded in optimizing bandwidth allocation in computer networks. III. SECURITY POLICIES The main purpose of security is to protect assets of an organization. Security risks are being increased due to the usage of computers, computer networks, Internet and other electronic computing resources. With the advent of Internet based e-Commerce applications there is ever increasing trend of online payments and thereby increased threats of security. The security risks are growing as computing facilities are growing. To overcome this problem different kind of security devices are introduced. Firewall is software of hardware solution that monitors incoming and outgoing packets from time to time. As the information security plays a vital role in safeguarding assets and intellectual properties of an organization, security risks www.ijmetmr.com/icecv2015 became a common issue to be heard. The security risks include hacking data, data leakage, and defacement of web sites. Organizations need to take more care on information security as their assets are in the form of information resources. In fact information security needs to be given paramount importance. It is more important when businesses are connected to Internet there is growing interconnectivity in terms of devices and applications in a distributed environment. Such environment is vulnerable to security threats. Security is crucial for all kinds of computer networks. Public Key Infrastructure (PKI) has been around for securing communications in networks. Lambrinoudakis et al. [7] explored PKI-based security policy for safeguarding e-Government services in distributed environment. The security requirements for communications include integrity, confidentiality, nonrepudiation, source storage, logging, access control and authorization, identification and authentication. Management PKI services that are used in security services and the PKI and cryptographic services include camouflaging, TTP, encryption and digital signatures. The e-Government security requirements include availability, performance, management of privileges, authentication, logging, integrity, confidentiality, non-repudiation, anonymity, public trust, untraceability and secure storage. 3.1 Policy Languages Policy languages have been around for network and security management. Policy driven management and policy driven security play a vital role in establishing fundamental security in computer networks. Han and Lei [8] made a review of such languages. The policy languages include PFDL, PDL, Ponder, CIM-SPL, KAOS, XACML, Rei, EPAL, P3P/APPEL, ASL and VALID. The features in the policy languages include ECA, XML, index, RBAC, Obligation, and Formalization. The policy driven management architecture is as shown in Figure 3. Page 3 Fig.3 Illustrates policy-driven management architecture [8] The policy – driven management is crucial in computer networks. PEP and PDP are for policy enforcement and policy decision making respectively. Policy Repository (PR) stored all policy related information. Policy authorization point (PAP) is responsible to restore policy repository. The PDP can take policy details from PR and take appropriate decisions based on the event or request. The PDP gives policy decisions to PEP while the PEP is responsible for enforcing such policy for high level of security in computer networks [8]. Gungor and Lambert [10] explored communication networks and managing them for automation of electric systems. In the process they proposed a structured mechanism that can be used to make effective decisions. Network management policies were also employed for designing water reservoir [12]. 3.2 Integrating Policies with Intrusion Detection System Network and security policies can be exploited by an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). According to Aydin, Zaim, and Ceylan [11] there are many kinds of IDS available. They are broadly classified into anomaly based and misuse based. The misuse-based IDS can identify any events that are not compatible with security and network policies. The anomaly based IDS, on the other hand, identifies abnormal activities involved in the system and considers such activities as potential attacks. There are many techniques used for anomaly detection such as genetic algorithms, neural networks, and data mining methods. Snort is an IDS which is widely used and based on misuse based approach. 3.3 Dynamic Modification of Policies www.ijmetmr.com/icecv2015 When network policies are changed dynamically, it is possible to have a system that can adapt to future requirements. Gorla and Pugliese [13] proposed a specification for access control model that enables dynamic modification of policies. The static and dynamic checking is possible by using policies that can be used to control access to computing resources. As the network security is ever changing phenomenon, it is essential to have new policies and modify existing policies to cope with new developments. Towards this end, the network system should have capabilities that can be leveraged to ensure fool proof security. It is more so in the highly distributed networks where different nodes located in various geographical places can be seamlessly integrated and policies can be enforced to have end to end security. 3.4 Agent Based Approach for Network Management In case of distributed system, the network management becomes very complex. In spite of policies and monitoring applications, the network management is tedious task. Gavalas et al. [14] presents a hierarchical network infrastructure where agent – based approach is used for network management. Mobile Agent (MA) is the component that moves over network infrastructure and manages network in a scalable fashion. Distributed mobile agents that are code components are flexible and cost-effective to perform network monitoring activities. The mobile agents in distributed environment can fulfil many needs of network management. Mobile Ad Hoc Networks (MANETs) can be protected by using cluster based security schemes that are applied when a node leaves or joins network. The network security is based on policies that are used by clusters. The cluster communication is based on the policies defined. IV CONCLUSIONS & FUTURE WORK In this paper we studied and reviewed various aspects of policy based security and network management in computer networks. Computer networks are diversified into different kinds to cater different services. In all such networks security has been an important concern that needs to be addressed. The security and network management issues are never ending problems. Page 4 Therefore they are to be handled from time to time. In tune with this they are to be changed based on the changing needs of the organizations besides vulnerabilities and threats envisaged. Moreover computer networks became wired and wireless and the security policies are different for both of them. Security policies are good only when the person who defines them has good knowledge. Nevertheless, security policies are playing a dominant role in abusive based protection mechanisms. This paper throws light into policy based security and network management dynamics by presenting the present state-of-the-art. This paper can be extended further to propose a framework that can guide framing policies and changing them dynamically for fool proof security of computer networks. REFERENCES [1] Patrick Cohendet a,, Frieder Meyer-Krahmer. (2001). The theoretical and policy implications of knowledge codification. ELsevier. 30 . p.213-313. [2] Dijiang Huang , Mayank Verma. (2009). ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. ELsevier. 7 . p.1526–1535. [3] Kaustubh S. Phanse, Luiz A. DaSilva. (2003). Addressing the requirements of QoS management for wireless ad hoc networks.ELsevier. 23 . p.1263–1273. [4] G. MacLarty, M. Fry. (2001). Policy-based content delivery: an active network approach. ELsevier. 24 . p.12-17. [5] Petre Dini a, Alexander Clemm b, Tom Gray c, Fuchun Joseph Lin d, Luigi Logrippo e, Stephan Reiff-Marganiec. (2004). Policyenabled mechanisms for feature interactions: reality, expectations, challenges.ELsevier. 45 .p.56-60. [6] Y. Thomas Hou a, Bo Li b, Shivendra S. Panwar c, Henry Tzeng d. (2000). On network bandwidth allocation policies and feedback control algorithms for packet networks. ELsevier. 34 .p.23-33. [7] Costas Lambrinoudakisa, Stefanos Gritzalisa, Fredj Dridib, Gu¨nther Pernul. (2003). www.ijmetmr.com/icecv2015 Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. ELsevier. 26 .p.25-34. [8] Weili Han , Chang Lei. (2012). A survey on policy languages in network and security management. ELsevier. 56 . p.56-60. [9] V.C. Gungor a, F.C. Lambert. (2006). A survey on communication networks for electric system automation. ELsevier. 50 . p.23-33. [10] M. Ali Aydın ,A. Halim Zaim, K. Gökhan Ceylan. (2009). A hybrid intrusion detection system design for computer network security.ELsevier. 35 . p.56-60. [11] A. Castellettia, D. de Rigoa, A.E. Rizzolib, R. Soncini-Sessaa, E. Weber. (2007). Neuro-dynamic programming for designing water reservoir network management policies. ELsevier. 15. p.977–1000. [12] Daniele Gorla , Rosario Pugliese. (2009). Dynamic management of capabilities in a network aware coordination language. ELsevier. 78 .p.23-33. [13] Damianos Gavalasa,b, Dominic Greenwoodc, Mohammed Ghanbarib, Mike O’Mahony. (2002). Hierarchical network management: a scalable and dynamic mobile agent-based approach. ELsevier. 38 .p.56-60. [14] Vijay Varadharajan, Rajan Shankaran, Michael Hitchens. (2004). Security for cluster based ad hoc networks. ELsevier. 27 . p.25-34 Page 5