Security Engine Management of Router based on Security Policy

被引:0
|
作者
Jo, Su Hyung [1 ]
Kim, Ki Young [1 ]
Lee, Sang Ho
机构
[1] Elect & Telecommun Res Inst, Taejon 305606, South Korea
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10 | 2005年 / 10卷
关键词
Policy server; security engine; security management; security policy;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper relates to a security engine management of router based on a security policy, which is the definition of security function against a network intrusion. This paper explains the security policy and designs the structure of security engine management framework.
引用
收藏
页码:116 / 119
页数:4
相关论文
共 50 条
  • [41] Router architecture evaluation for security network
    Yungho Choi
    Lark-Kyo Kim
    Hyungkeun Ahn
    Neungsoo Park
    Peer-to-Peer Networking and Applications, 2014, 7 : 628 - 635
  • [42] The open router of active network and security
    He, MW
    Liu, XC
    Zhang, GZ
    KYBERNETES, 2004, 33 (02) : 268 - 272
  • [43] Chinese Wall Security Model for Workflow Management Systems with Dynamic Security Policy
    Hsiao, Yu-Cheng
    Hwang, Gwan-Hwan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 417 - 440
  • [44] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [45] Policy based security management in 3G mobile networks
    Li, M
    Gopal, R
    ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2003, : 554 - 562
  • [46] Security Policy based Device Management for Supporting Various Mobile OS
    Lee, Ji-Eun
    Park, Se-Ho
    Yoon, Hyoseok
    2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGY AND INFORMATION MANAGEMENT (ICCTIM), 2015, : 156 - 161
  • [47] The development of policy proxy agent in policy-based network security management system
    Information Security Research Division, Electronics and Telecommunications Research Institute, 161, Gajeong-dong, Yuseong-gu, Daejeon City 305-350, Korea, Republic of
    WSEAS Trans. Commun., 2007, 1 (236-240):
  • [48] Security and resource policy-based management architecture for ALAN servers
    Olukemi, T
    Liabotis, I
    Prnjat, O
    Sacks, L
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 91 - 102
  • [49] Policy-based security management for ad hoc wireless systems
    Zheng, Harold
    Wang, Sherry
    Nichols, Robert A.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
  • [50] Security policy management for healthcare system network
    Lee, K
    Jiang, Z
    Kim, S
    Kim, S
    HEALTHCOM 2005: 7TH INTERNATIONAL WORKSHOP ON ENTERPRISE NETWORKING AND COMPUTING IN HEALTHCARE INDUSTRY, PROCEEDINGS, 2005, : 289 - 292