期刊文献+

一种基于策略驱动的联动平台设计与应用 被引量:1

Design and Application of Coordination Platform Based on Policy-driven
下载PDF
导出
摘要 提出了一种基于事件触发策略驱动的联动平台设计,描述了事件触发的策略驱动模型和平台总体结构以及平台联动过程。按照规则对安全事件队列进行处理,提高了策略的效率。使用XML语言描述策略,具有简单、高效的优点。采用组件化的思想,可将各种安全功能以组件的方式挂接在联动平台下,实现了集中控制、分散响应的管理模式,具有很好的灵活性和可扩展性。实践证明,此联动平台提高了网络安全管理的效率,对大规模网络安全管理具有很大的实用价值。 A design of coordination platform based on event-triggered and policy-driven is presented. The policy-driven model of event-triggered, the architecture of platform and the process of coordination are described. Rules are applied to treat security events queue, which improves the efficiency of policy. Policy is described with XML which is simple with high efficiency. Adopting the thought of component with well flexibility and extensibility, a management mode of centralized control and decentralized response is achieved through implementing all the security functions as the components of the platform. Demonstrated in practice, the coordination platform improves the efficiency of network security management and is greatly useful to the security management of large-scale network.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第2期283-284,F0003,共3页 Computer Engineering
基金 国防"十五"重点预研项目
关键词 策略驱动 联动平台 安全组件 XML Policy-driven Coordination platform Security component XML
  • 相关文献

参考文献6

二级参考文献11

  • 1[1]CERT Coordination Center. CERT/CC Statistics 1988-2002. http:// www.cert.org/stats/cert_stats.html 被引量:1
  • 2[2]Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, 1994,26 (3): 211-254 被引量:1
  • 3[3]Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, 1997-05 被引量:1
  • 4[4]Howard J D, Longsta T A. A Common Language for Computer Security Incidents. Technical Report SAND98-8667, Sandia National Laboratories, 1998-10 被引量:1
  • 5[6]Carver C A, Jr. Hill J M D, Pooch U. A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. In IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, New York, 2000-06-06 被引量:1
  • 6[7]Carver C A, Pooch U. An Intrusion Response Taxonomy and Its Role in Automatic Intrusion Response. In IEEE Systems, Man, and Cyber- netics Information Assurance and Security Workshop, West Point, New York, 2000-06-06 被引量:1
  • 7DMTF.Common Information Model Specification Version 2.2.DSP0004,1999-06. 被引量:1
  • 8Moon: B.Policy Core Information Model Version I Specification,RFC3060. 2001-02. 被引量:1
  • 9Damianou N,Dulay N,Lupu E,et al.Ponder. A Language for Specifying Security and Management Policies for Distributed System.Imperial College DTR00- 1,2000-01. 被引量:1
  • 10Sloman M,Lupu E. Security and Management Policy Specification.IEEE Network, 2002,(2):10-19. 被引量:1

共引文献15

同被引文献8

  • 1涂旭平,李之棠.基于BEEP-JAVA的IDXP profile的实现[J].华中科技大学学报(自然科学版),2003,31(S1):147-149. 被引量:1
  • 2张新跃,邓炜春,沈树群.策略驱动的网络安全管理模型[J].计算机应用研究,2005,22(1):226-228. 被引量:12
  • 3卢锦泉,苏一丹.网络管理中安全策略与安全信息共享模型研究[J].广西民族学院学报(自然科学版),2005,11(2):77-81. 被引量:4
  • 4DEBAR D.The intnision detection message exchange format[EB/OL].[2009-11-24].http://www.rfc-editor.org/rfc/rfc4765.txt. 被引量:1
  • 5FEINSTEIN B,MATTHEWS G.The intrusion detection exchange protocol[EB/OL].[2009-11-24].http://www.rfc-editor.org/rfc/rfc4767.txt. 被引量:1
  • 6DEBAR H,THOMAS Y,CUPPENS F,et al.Enabling automated threat response through the use of a dynamic security policy[J].Journal in Computer Virology,2007,3(3):195 -210. 被引量:1
  • 7DA SILVA P F,WESTPHALL C B.An intrusion answer model compatible with the alerts idwg model[C]// Network Operations and Management Symposium.New York:IEEE Communications Society,2006:1-4. 被引量:1
  • 8KOUTEPAS G.STAMATELOPOULOS F,MAGLARIS B.Distributed management architecture for cooperative detection and reaction to DDoS attacks[J].Journal of Network and Systems Management,2004,12(1):73-94. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部