Security Engine Management of Router based on Security Policy

被引:0
|
作者
Jo, Su Hyung [1 ]
Kim, Ki Young [1 ]
Lee, Sang Ho
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10 | 2005年 / 10卷
关键词
Policy server; security engine; security management; security policy;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper relates to a security engine management of router based on a security policy, which is the definition of security function against a network intrusion. This paper explains the security policy and designs the structure of security engine management framework.
引用
收藏
页码:116 / 119
页数:4
相关论文
共 50 条
  • [1] Router security configuration management
    Zhang, Yong
    Zhang, Deyun
    Jiang, Xuxian
    Huo, Wei
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 65 - 67
  • [2] A Security Policy Engine for Building Energy Management Systems
    Lim, Jiahui
    Ong, Wenshei
    Tefek, Utku
    Esiner, Ertem
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 231 - 244
  • [3] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
  • [4] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [5] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +
  • [6] ROUTER SECURITY ISSUES
    Tergeusizova, A. S.
    Toigojinova, A. J.
    BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2013, (06): : 34 - 37
  • [7] Network security based on router dynamic authentication
    Xi'an Jiaotong Univ, Xi'an, China
    Hsi An Chiao Tung Ta Hsueh, 6 (1-4):
  • [8] The Policy Machine for security policy management
    Hu, VC
    Frincke, DA
    Ferraiolo, DF
    COMPUTATIONAL SCIENCE -- ICCS 2001, PROCEEDINGS PT 2, 2001, 2074 : 494 - 503
  • [9] A virtual scheme of router based on security isolation
    Yang, Yun
    Wang, Ji-Zhe
    Wu, Bin
    Wu, Lie
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 658 - 665
  • [10] The design and implementation of IPSec Security Policy LFB on ForCES router
    Lian, Jingwei
    Wang, Weiming
    Gao, Ming
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 548 - 551