Principles of secure network configuration: Towards a formal basis for self-configuration

Foley, S. N. and Fitzgerald, William M. and Bistarelli, S. and O'Sullivan, B. and Ó Foghlú, Mícheál (2006) Principles of secure network configuration: Towards a formal basis for self-configuration. In: Autonomic Principles Of Ip Operations And Management, Proceedings. Lecture Notes In Computer Science, 4268 . Springer, Berlin, pp. 168-180. ISBN 978-354047701-3

[thumbnail of IPOM2006.pdf]

Download (214kB) | Preview


The challenge for autonomic network management is the provision of future network management systems that have the characteristics of self-management, self-configuration, self-protection and self-healing, in accordance with the high level objectives of the enterprise or human end-user. This paper proposes an abstract model for network configuration that is intended to help understand fundamental underlying issues in self-configuration. We describe the cascade problem in self-configuring networks: when individual network components that are securely configured are connected together (in an apparently secure manner), a configuration cascade can occur resulting in a mis-configured network. This has implications for the design of self-configuring systems and we discuss how a soft constraint-based framework can provide a solution.

Item Type: Book Section
Additional Information: ISI Document Delivery No.: BFL04 English Article <Go to ISI>://000242563100015
Departments or Groups: Walton Institute for Information and Communications Systems Science
Divisions: *NONE OF THESE*
Date Deposited: 17 Nov 2007 13:30
Last Modified: 30 May 2022 12:25

Actions (login required)

View Item View Item