Non-dominated sorting particle swarm optimization (NSPSO) and network security policy enforcement for Policy Space Analysis

Thathan Sureshkumar, Mani Lingaraj, Bojan Anand, Thathan Premkumar

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

Network operators depend on security services with the aim of safeguarding their IT infrastructure. Various types of network security policies are employed on a global scale and are disseminated among several security middleboxes implemented in networks. But, owing to the complications in security policies, it is not quite efficient to directly use the path-wise enforcement schemes that are prevalent. The major motivation of this work is to improve security levels and solve the policy enforcement problem. For the first time, this work reports the issue of policy enforcement on middleboxes. The major contribution of this work is to design security policy enforcement as a Weighted K Set Covering Problem, and we designed a Policy Space Analysis (PSA) tool intended for a group of operations in the security policy. This PSA tool was developed based on range-signified hyper-rectangles, which are indexed by the Hilbert R-tree. Leveraging the PSA, we first investigated the topological features of various kinds of policies. Balancing the PSA tool in a non-dominated sorting particle swarm optimization technique exposes the intrinsic difficulties of this security strategy and provides guidance for designing the enforcement approach. In addition, in this research, a new fuzzy rule-based classification system is introduced for packet classification. A scope-wise policy enforcement algorithm was proposed, which chooses a moderate number of enforcement network nodes for deploying multiple policy subsets in a greedy manner. This scheme is much quicker compared with the first one and therefore has found its application in real-time deployments.

Original languageEnglish
Article numbere3554
JournalInternational Journal of Communication Systems
Volume31
Issue number10
DOIs
StatePublished - 10 Jul 2018

Keywords

  • computer network
  • policy enforcement algorithm
  • policy space analysis and fuzzy rule
  • security

Fingerprint

Dive into the research topics of 'Non-dominated sorting particle swarm optimization (NSPSO) and network security policy enforcement for Policy Space Analysis'. Together they form a unique fingerprint.

Cite this