Michael Backes, Birgit Pfitzmann, et al.
Int. J. Inf. Secur.
Knowledge of the security zone classification of devices in an enterprise information technology (IT) infrastructure is essential in many enterprise IT transformation and optimization activities. We describe a systematic and semi-automated approach for discovering the security zone classification of devices in an enterprise network. For reduced interference with normal operation of the IT infrastructure, our approach is structured in stages, each consisting of two phases: one phase involves collecting information about actually allowed network flows, followed by an analysis phase. As part of our approach, we describe an elimination-based inference algorithm. We also present an alternative to the algorithm based on the Constraint Satisfaction Problem, and explore trade-offs between the two. Using a case study, we demonstrate the validity of our approach.
Michael Backes, Birgit Pfitzmann, et al.
Int. J. Inf. Secur.
Nikolai Joukov, Birgit Pfitzmann, et al.
SCC 2009
Carl E. Abrams, Juerg von Känel, et al.
IBM Systems Journal
Birgit Pfitzmann, Nikolai Joukov
SCC 2011