Security Engine Management of Router based on Security Policy

被引:0
|
作者
Jo, Su Hyung [1 ]
Kim, Ki Young [1 ]
Lee, Sang Ho
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10 | 2005年 / 10卷
关键词
Policy server; security engine; security management; security policy;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper relates to a security engine management of router based on a security policy, which is the definition of security function against a network intrusion. This paper explains the security policy and designs the structure of security engine management framework.
引用
收藏
页码:116 / 119
页数:4
相关论文
共 50 条
  • [31] A usability study of security policy management
    Herzog, Almut
    Shahmehri, Nahid
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 296 - +
  • [32] Policy framework for security and privacy management
    Karat, J.
    Karat, C. -M.
    Bertino, E.
    Li, N.
    Ni, Q.
    Brodie, C.
    Lobo, J.
    Calo, S. B.
    Cranor, L. F.
    Kumaraguru, P.
    Reeder, R. W.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [33] Security Policy Compliance with Violation Management
    Brunel, Julien
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Sans, Thierry
    Bodeveix, Jean-Paul
    FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, 2007, : 31 - 40
  • [34] LEGAL POLICY AND SECURITY POLICY AS ELEMENTS OF SECURITY POLICY
    WEEDE, E
    ARCHIVES EUROPEENNES DE SOCIOLOGIE, 1984, 25 (01): : 147 - 166
  • [36] SECURITY POLICY AND EUROPEAN SECURITY
    DUCKWITZ, GF
    AUSSEN POLITIK, 1970, 21 (01): : 5 - 13
  • [37] Design of embedded network router for video based on security consideration
    Zhang, Zhenxin
    Tong, Jigang
    Chen, Zenqiang
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 2047 - 2052
  • [38] Router-based IoT Security using Raspberry Pi
    Nagy, Lilla
    Colesa, Adrian
    2019 18TH ROEDUNET CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2019,
  • [39] Router architecture evaluation for security network
    Choi, Yungho
    Kim, Lark-Kyo
    Ahn, Hyungkeun
    Park, Neungsoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 628 - 635
  • [40] Distributed Shadow for Router Security Defense
    Li, Yufeng
    Tian, Le
    Qiu, Han
    Zhang, Chuanhao
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (02) : 193 - 206