Skip to main content

A High-Level Policy Description Language for the Network ACL

  • Conference paper
Book cover Parallel and Distributed Computing: Applications and Technologies (PDCAT 2004)

Abstract

Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the enormous network. It causes the network to lock down within an hour or so [1]. The situation worsens before it can be monitored and notified by the supervisor. Since the network is not available, it becomes hard to serve a node with an order. It is difficult for most large networks to introduce a consistent monitoring tool and reporting system. It is also more difficult to manage the configuration of network nodes with the matter of policy. We represent abstract language that supports various functions. Functions are in grouping, event, compliance and intermediate forms. This high-level language abstracts the control behavior of the network nodes that have various setting-up methodologies. We will describe the features of the language and give examples of the preliminary implementation on the test-bed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lad, M., Zhao, X., Zhang, B., Massey, D., Zhang, L.: An Analysis of BGP Update Burst during Slammer Attack. In: Das, S.R., Das, S.K. (eds.) IWDC 2003. LNCS, vol. 2918. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Triton BNF (2004), http://woorisol.knu.ac.kr/lab/content/triton-bnf.txt

  3. Stone, G.N., Lundy, B., Xie, G.G.: Network Policy Languages: A Survey and a New Approach. IEEE Network 15(1), 10–20 (2001)

    Article  Google Scholar 

  4. NetSPoc homepage (2004), http://netspoc.berlios.de/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Lee, K., Kim, S., Seo, J., Lee, E., Joo, M. (2004). A High-Level Policy Description Language for the Network ACL. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_146

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30501-9_146

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24013-6

  • Online ISBN: 978-3-540-30501-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics