Design of policy-based security management for intrusion detection

被引:0
|
作者
Jo, SH [1 ]
Kim, JN [1 ]
Soh, SW [1 ]
机构
[1] ETRI, Informat Secur Res Div, Taejon, South Korea
关键词
IDS; COPS; IPsec; policy based security management;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is a next generation security solution that minimizes the damage of hacking, in case a firewall fails in the isolation of intrusions, and responds the intrusion dynamically. Legacy security management is difficult to deal with changes in security environments, because it lacks of security policies and integrated security methods. In order to resolve these problems, we need policy-based security management (PBSM) that has standard security policy, consulting, diagnosis, maintenance, and repair function. It is necessary to monitor and control security services by PBSM. In this paper, we design and implement PBSM for intrusion detection. Our platform consists of a network node, general hosts and a management node. The network node is a security router that performs packet filtering, intrusion detection, intrusion analysis, intrusion response, and policy enforcement. The management node manages a network node and general hosts by security policies. We design the channel between a management node and a network node using Common Open Policy Service (COPS) and IP Security (IPsec). We have applied java and web to implementing GUI for PBSM. Java is used to program the user interface for PBSM. As the proposed system makes use of web, PBSM is easily accessed through the web remotely in real time. As the proposed system makes use of Web, security management system is easily accessed through the Web.
引用
收藏
页码:337 / 340
页数:4
相关论文
共 50 条
  • [31] Policy-based frequency management
    Wagner, Gregory C.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1775 - 1779
  • [32] Policy-Based Profiles for Network Intrusion Response Systems
    Hughes, Kieran
    McLaughlin, Kieran
    Sezer, Sakir
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 279 - 286
  • [33] The Design and Implementation of a Smart Tap for Policy-based Power Management
    Morimoto, Naoyuki
    Tanaka, Masami
    Akehi, Terukazu
    Yoshida, Masaaki
    Yoshimizu, Hiroyuki
    Takiyamada, Masafumi
    Kamimura, Yohei
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 280 - 284
  • [34] Policy-Based Intrusion Detection in Web Applications by Monitoring Java']Java Information Flows
    Hiet, Guillaume
    Tong, Valerie Viet Triem
    Me, Ludovic
    Morin, Benjamin
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 53 - 60
  • [35] Intrusion detection: Introduction to intrusion detection and security information management
    Debar, H
    Viinikka, J
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 207 - 236
  • [36] SmartSSL: Efficient policy-based web security
    Gaspard, Camille
    Haidar, Batoul
    Kayssi, Ayman
    Chehab, Ali
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 833 - +
  • [37] Analysis of Policy-Based Security Management System in Software-Defined Networks
    Sood, Keshav
    Karmakar, Kallol Krishna
    Varadharajan, Vijay
    Tupakula, Uday
    Yu, Shui
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (04) : 612 - 615
  • [38] A policy-based security model for web system
    Xie, WX
    Ma, HD
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 187 - 191
  • [39] A Policy-based Dynamic Security Management Mechanism for MIPv6 Networks
    Gao, Tianhan
    Guo, Nan
    Zhu, Zhiliang
    ICWMMN 08, PROCEEDINGS, 2008, : 110 - 113
  • [40] Verifying Policy-Based Web Services Security
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (06):