期刊文献+

一种基于策略驱动的联动平台设计与应用 被引量:1

Design and Application of Coordination Platform Based on Policy-driven
下载PDF
导出
摘要 提出了一种基于事件触发策略驱动的联动平台设计,描述了事件触发的策略驱动模型和平台总体结构以及平台联动过程。按照规则对安全事件队列进行处理,提高了策略的效率。使用XML语言描述策略,具有简单、高效的优点。采用组件化的思想,可将各种安全功能以组件的方式挂接在联动平台下,实现了集中控制、分散响应的管理模式,具有很好的灵活性和可扩展性。实践证明,此联动平台提高了网络安全管理的效率,对大规模网络安全管理具有很大的实用价值。 A design of coordination platform based on event-triggered and policy-driven is presented. The policy-driven model of event-triggered, the architecture of platform and the process of coordination are described. Rules are applied to treat security events queue, which improves the efficiency of policy. Policy is described with XML which is simple with high efficiency. Adopting the thought of component with well flexibility and extensibility, a management mode of centralized control and decentralized response is achieved through implementing all the security functions as the components of the platform. Demonstrated in practice, the coordination platform improves the efficiency of network security management and is greatly useful to the security management of large-scale network.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第2期283-284,F0003,共3页 Computer Engineering
基金 国防"十五"重点预研项目
关键词 策略驱动 联动平台 安全组件 XML Policy-driven Coordination platform Security component XML
  • 相关文献

参考文献6

  • 1Moore B,Ellesson E,Strassner J,et al.Policy Core Information Model(Version 1 Specification)[S].RFC 3060,2001.
  • 2Lupu E,Sloman M.Conflicts in Policy-based Distributed Systems Management[J].IEEE Transactions on Software Engineering,1999,25(6).
  • 3Verma D C.Simplifying Network Administration Using Policy-based Management[J].IEEE Network,2002,16(2):20-26.
  • 4马欣,张玉清,顾新,冯涛.一种面向响应的网络安全事件分类方法[J].计算机工程,2004,30(11):103-105. 被引量:4
  • 5张少俊,李建华,郑明磊.基于策略的网络管理[J].计算机工程,2003,29(16):127-129. 被引量:13
  • 6IETF.Terminology for Policy-based Management[S].RFC3198,2001.

二级参考文献11

  • 1[1]CERT Coordination Center. CERT/CC Statistics 1988-2002. http:// www.cert.org/stats/cert_stats.html
  • 2[2]Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, 1994,26 (3): 211-254
  • 3[3]Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, 1997-05
  • 4[4]Howard J D, Longsta T A. A Common Language for Computer Security Incidents. Technical Report SAND98-8667, Sandia National Laboratories, 1998-10
  • 5[6]Carver C A, Jr. Hill J M D, Pooch U. A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. In IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, New York, 2000-06-06
  • 6[7]Carver C A, Pooch U. An Intrusion Response Taxonomy and Its Role in Automatic Intrusion Response. In IEEE Systems, Man, and Cyber- netics Information Assurance and Security Workshop, West Point, New York, 2000-06-06
  • 7DMTF.Common Information Model Specification Version 2.2.DSP0004,1999-06.
  • 8Moon: B.Policy Core Information Model Version I Specification,RFC3060. 2001-02.
  • 9Damianou N,Dulay N,Lupu E,et al.Ponder. A Language for Specifying Security and Management Policies for Distributed System.Imperial College DTR00- 1,2000-01.
  • 10Sloman M,Lupu E. Security and Management Policy Specification.IEEE Network, 2002,(2):10-19.

共引文献15

同被引文献8

  • 1涂旭平,李之棠.基于BEEP-JAVA的IDXP profile的实现[J].华中科技大学学报(自然科学版),2003,31(S1):147-149. 被引量:1
  • 2张新跃,邓炜春,沈树群.策略驱动的网络安全管理模型[J].计算机应用研究,2005,22(1):226-228. 被引量:12
  • 3卢锦泉,苏一丹.网络管理中安全策略与安全信息共享模型研究[J].广西民族学院学报(自然科学版),2005,11(2):77-81. 被引量:4
  • 4DEBAR D.The intnision detection message exchange format[EB/OL].[2009-11-24].http://www.rfc-editor.org/rfc/rfc4765.txt.
  • 5FEINSTEIN B,MATTHEWS G.The intrusion detection exchange protocol[EB/OL].[2009-11-24].http://www.rfc-editor.org/rfc/rfc4767.txt.
  • 6DEBAR H,THOMAS Y,CUPPENS F,et al.Enabling automated threat response through the use of a dynamic security policy[J].Journal in Computer Virology,2007,3(3):195 -210.
  • 7DA SILVA P F,WESTPHALL C B.An intrusion answer model compatible with the alerts idwg model[C]// Network Operations and Management Symposium.New York:IEEE Communications Society,2006:1-4.
  • 8KOUTEPAS G.STAMATELOPOULOS F,MAGLARIS B.Distributed management architecture for cooperative detection and reaction to DDoS attacks[J].Journal of Network and Systems Management,2004,12(1):73-94.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部