2021
DOI: 10.1016/j.cose.2020.102162
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Approach to Network Segmentation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…In contrast to the aforementioned works, we focus on ITSs where the network is smaller compared to the Internet. More importantly, we aim to capture complex dependencies between ITS components (rather than the statistical properties of the Internet) which is not possible with the aforementioned Works such as [29]- [31]and [32] propose approaches that optimize firewall policies according to specified security and performance goals. A limitation of these approaches is that they need existing firewall policies for all resources as inputs to perform optimization.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to the aforementioned works, we focus on ITSs where the network is smaller compared to the Internet. More importantly, we aim to capture complex dependencies between ITS components (rather than the statistical properties of the Internet) which is not possible with the aforementioned Works such as [29]- [31]and [32] propose approaches that optimize firewall policies according to specified security and performance goals. A limitation of these approaches is that they need existing firewall policies for all resources as inputs to perform optimization.…”
Section: Related Workmentioning
confidence: 99%
“…The defence-in-depth (DiD) methodology is a defensive approach traditionally implemented by network administrators to design and build secure networks by layering and segmenting them [ 3 ]. Network segmentation relies on organising corporate resources in zones with similar security requirements [ 4 , 5 ]. Then, a firewall enforcing restrictive policies is deployed between zones.…”
Section: Introductionmentioning
confidence: 99%
“…Cybersecurity practices and drawbacks. Organizations may use fundamental cybersecurity techniques such as multi-factor authentication (MFA) [28] or firewalls to decrease the damage of a cyberattack [24]. The purpose of these techniques, if properly conducted, is to segment the network into smaller blocks so that the contagion can be isolated or at least cause minimal damage by impacting only a fragment of the network.…”
Section: Introductionmentioning
confidence: 99%
“…In practice, there are many different ways to segment the network and the possibilities only increase as the organization expands in size [22,39]. Because of this, there is a great lack of formal approaches for network administrators to optimally segment networks [24]. And so, they segment the network based on their own experiences, preferences, and available resources of the organization [22,24].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation