Design of policy-based security management for intrusion detection

被引:0
|
作者
Jo, SH [1 ]
Kim, JN [1 ]
Soh, SW [1 ]
机构
[1] ETRI, Informat Secur Res Div, Taejon, South Korea
关键词
IDS; COPS; IPsec; policy based security management;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is a next generation security solution that minimizes the damage of hacking, in case a firewall fails in the isolation of intrusions, and responds the intrusion dynamically. Legacy security management is difficult to deal with changes in security environments, because it lacks of security policies and integrated security methods. In order to resolve these problems, we need policy-based security management (PBSM) that has standard security policy, consulting, diagnosis, maintenance, and repair function. It is necessary to monitor and control security services by PBSM. In this paper, we design and implement PBSM for intrusion detection. Our platform consists of a network node, general hosts and a management node. The network node is a security router that performs packet filtering, intrusion detection, intrusion analysis, intrusion response, and policy enforcement. The management node manages a network node and general hosts by security policies. We design the channel between a management node and a network node using Common Open Policy Service (COPS) and IP Security (IPsec). We have applied java and web to implementing GUI for PBSM. Java is used to program the user interface for PBSM. As the proposed system makes use of web, PBSM is easily accessed through the web remotely in real time. As the proposed system makes use of Web, security management system is easily accessed through the Web.
引用
收藏
页码:337 / 340
页数:4
相关论文
共 50 条
  • [41] Policy-Based Security Management System for 5G Heterogeneous Networks
    Alquhayz, Hani
    Alalwan, Nasser
    Alzahrani, Ahmed Ibrahim
    Al-Bayatti, Ali H.
    Sharif, Mhd Saeed
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [42] Policy-based management for IP networks
    Stevens, ML
    Weiss, WJ
    BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 75 - 94
  • [43] Design and implementation of Policy-Based Network Management based on SNMPv3
    Yue, Y
    Xiao, DB
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 104 - 106
  • [44] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [45] Policy-based NFV Management and Orchestration
    Makaya, Christian
    Freimuth, Douglas
    Wood, David
    Calo, Seraphin
    2015 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORK (NFV-SDN), 2015, : 128 - 134
  • [46] A policy-based storage management framework
    Devarakonda, M
    Gelb, J
    Saha, A
    Strickland, J
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 232 - 235
  • [47] Policy-based management: A historical perspective
    Boutaba, Raouf
    Aib, Issam
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (04) : 447 - 480
  • [48] Policy-Based Management for Smart Mobility
    Vazao, Teresa
    Gomes, Joao Duarte
    Chaves, Ricardo
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 278 - 287
  • [49] Prime time for policy-based management
    Cuervo, F
    Jansen, A
    ALCATEL TELECOMMUNICATIONS REVIEW, 2003, (03): : 203 - 208
  • [50] Accurate and automated system call policy-based intrusion prevention
    Lam, Lap Chung
    Li, Wei
    Chiueh, Tzi-cker
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 413 - 422