Browse > Article
http://dx.doi.org/10.3745/KIPSTD.2002.9D.6.1063

A Development of Central Policy Database for managing Heterogeneous Firewall Systems  

Lee, Dong-Young (성균관대학교 정보통신공학부)
Chung, Tai-Myoung (성균관대학교 정보통신공학부)
Abstract
With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.
Keywords
Integrated Security Management; Central Policy Database; Policy Conflict;
Citations & Related Records
연도 인용수 순위
  • Reference
1 David Perkins, Even McGinnis, Understanding SNMP MIBs, Prentice Hall PTR, 1997
2 William R. Cheswick, Steven M.Bellovin, 'Firewalls and Internet Security : repelling the willy hacker,' Addison Wesley, 1994
3 D. Brent Chapman, Elizabeth D. Zwicky, 'Building Internet Firewalls,' O Reilly & Associations, Inc., January, 1996
4 Chris Hare, Karanjit Siyan, 'Internet Firewalls and Network Security,'-2nd ed., New Readers, 1996
5 J. Moffett, Morris S.Sloman, 'Policy Conflict Analysis in Distributed System Management,' Journal of Organizational Computing, Vol.4, No.1, pp.1-22, 1994   DOI   ScienceOn
6 Emil C. Lupu, Morris Sloman, 'Conflicts in Policy-Based Distributed Systems Management,' Journal of IEEE Transaction on Software Engineering, Vol.25, No.6, pp.852-869, 1999   DOI   ScienceOn
7 이동영, 김동수, 방기홍, 김홍선, 정태명, 'SNMP를 이용한 웹 기반의 통합 보안관리 시스템', KNOM(Korea Network and Operations Management)Review 논문지, Vol.2, pp.1167-1171, 1999
8 Cuppens, F, Cholvy, L, Saurel. C, Carrere, J, 'Merging security policies : analysis of a practical example,' Computer Security Foundations Workshop, Proceedings. 11th IEEE, pp.123-136, 1998   DOI
9 이동영, 방기홍, 홍승선, 김동수, '이종의 침입차단 시스템 관리를 위한 웹기반의 통합보안관리시스템 개발', 한국정보보호센타 정보보호 우수논문지 공모전, 응용기술 분야 장려, 1999
10 Cholvy. L, Cuppens. F, 'Analyzing consistency of security policies,' Security and Privacy, Proceedings, IEEE Symposium on, pp.103-112, 1997   DOI
11 Douglas Hyde, 'Web-based Management', 3Com Corp., Technical report, 1997
12 D. Y. Lee, D. S. Kim, K. H. Pang, H. S. Kim, T. M. Chung, 'A Design of Scalable SNMP Agent for Managing Heterogeneous Security Systems,' NOMS(Network Operations and Management Symposium)2000, pp.293-294, April. 2000   DOI
13 William Stallings, SNMP, SNMP v2, SNMP v3, and RMON 1 and 2-3rd ed., Addison Wesley, 1999
14 Randy Jay Yarger, George Reese, Tim King, 'MySQL and mSQL,' O Reilly & Associations Inc., Janyary, 1999
15 http://www.mysql.com/
16 Rene Wies, 'Using a Classification of Management Policies for Policy Specification and Policy Transformation,' Integrated Network Management IV, pp.44-56, 1995   DOI
17 Rene Wies, 'Policy Definition and Classification : Aspects, Criteria, and Examples, Proceeding of IFIP/IEEE International Workshop on Distributed Systems : Operations & Management, Toulouse, France, Oct., 1994
18 Miriam J. Maullo and Seraphin B. Calo, 'Policy Management : An Architecture and Approach Systems Management,' Proceedings of the IEEE First International Workshop on, pp.13-26, 1993   DOI