Modeling of policy-based network with SVDB

被引:0
|
作者
Lee, WY [1 ]
Seo, HS [1 ]
Cho, TH [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon, South Korea
来源
关键词
security policy; PBNM (policy-based network management); network security; DEVS formalism; simulation; data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There are many security vulnerabilities in computer systems. They can be easily attacked by outsiders or abused by insiders who misuse their rights or who attack the security mechanisms in order to disguise as other users or to detour the security controls. Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. This article describes the modeling and simulation of a security system based on a policy-based network that has some merits. We present how the policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are inducted, and how the policy rules are transformed into PCIM (Policy Core Information Model). In the network security environment, each simulation model is hierarchically designed by DEVS (Discrete EVent system Specification) formalism.
引用
收藏
页码:323 / 332
页数:10
相关论文
共 50 条
  • [1] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [2] Policy-based network management
    Choudhary, AR
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 19 - 29
  • [3] Policy-based network management
    Wang, CK
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 101 - 105
  • [4] Network prediction in a policy-based IP network
    Beigi, M
    Verma, D
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 2522 - 2526
  • [5] Modeling of policy-based mobile payment
    Kim, SK
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 1009 - 1011
  • [6] Applications of policy-based network management
    Chadha, R
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 907 - 908
  • [7] Policy-based network load management
    Hossain, A
    Shu, HF
    Gasman, CR
    Royer, RA
    BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 95 - 108
  • [8] A policy-based network management system
    Bhatia, R
    Kohli, M
    Lobo, J
    Virmani, A
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL I AND II, 1999, : 465 - 471
  • [9] Policy-based network management in an integrated mobile network
    Oliveira, JL
    Gonçalves, P
    Dziunikowski, W
    Wszolek, J
    Rasmussen, S
    Lopes, RP
    Roque, V
    TELECOMMUNICATIONS 2005, PROCEEDINGS, 2005, : 59 - 64
  • [10] A policy-based network management system for IPVPN
    Guo, X
    Yang, K
    Galis, A
    Cheng, XC
    Yang, B
    Liu, DY
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1630 - 1633