Francesca Coriale
An Attack Risk Assessment Model for Network Security Automation.
Rel. Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza. Politecnico di Torino, Corso di laurea magistrale in Cybersecurity, 2025
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (4MB) | Preview |
Abstract
Next-generation computer networks are increasingly complex due to their size, heterogeneity, and dynamism, making them vulnerable to sophisticated, multi-stage and multi-vector attacks. Manual security reconfiguration methods are too slow and error-prone, leading to delays and misconfigurations. To address these problems, the recent literature on network security configuration has focused on automated reconfiguration approaches for faster and more resilient responses. However, the dynamic nature of modern computer networks impacts the preservation of security during the updates, as improper sequencing can create insecure transient states. In lights of these motivations, the FATO methodology has been proposed. The aim is to optimize the scheduling of configuration changes in distributed virtual firewalls to maximize the number of secure intermediate states, minimizing violations of prioritized security policies.
Optimality and formal correctness are achieved throughout the formulation of a Maximum Satisfiability Modulo Theories (MaxSMT) problem
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
