• Title/Summary/Keyword: 정책기반네트워크 관리

Search Result 283, Processing Time 0.027 seconds

Firewall System based on Network Traffic State (네트워크 트래픽 상태 기반의 방화벽 시스템)

  • Song, Byung-Wook;Kim, Hong-Chul;Park, In-Sung;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1077-1080
    • /
    • 2001
  • 본 논문에서는 트래픽 상태를 기반으로 네트워크 패킷의 상호관계에 따라 트래픽을 제어하는 방화벽 모델을 제시한다. 기존의 방화벽은 단순한 필터링 메커니즘과 보안 정책으로 복잡하고 다양해진 네트워크 트래픽 패턴에 효과적으로 대응할 수 없었다. 그러나, 본 논문에서는 네트워크 트래픽의 정보를 정적인 상태 정보와 동적인 상태 정보로 구분하여 수집하고 이러한 정보를 보안 정책에 의하여 생성된 상태 그래프의 의사 결정에 반영함으로서 트래픽의 미세한 변화에도 효과적이고 다양한 대응을 할 수 있도록 하였다. 그리고, 트래픽 분석기, 네트워크 에이전트, 관리자 인터페이스로 구분함으로서 관리자 인터페이스의 형태와 위치의 독립성을 높임으로서 보다 효과적인 사용환경을 제공하도록 하였다.

  • PDF

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안 관리시스템의 침입탐지 몇 대응을 위한 보안 정책 모델)

  • 손우용;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.81-87
    • /
    • 2004
  • Very various intrusion by development of systems that is based on network is spread. To detect and respond this intrusion, security solutions such as firewall or IDS are bringing and management of security system that load these becomes more harder. Moreover, because environment of systems that require security is various, hard to manage establishing suitable security policy Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

The Design of the Security Management System for Secure Internet (안전한 인터넷을 위한 보안관리 시스템 설계)

  • 정연서;박배욱;손승원;오창석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.74-79
    • /
    • 2002
  • In this paper, we designed the Policy-based ESM(Enterprise Security Management) for network security in Internet. First, we consider the existed network management and present ESM. And then analyze existent systems and drew consideration items at system design. This paper applied to PBNM technology in order to improve security network management.

  • PDF

A Virtual Topology Management Policy in Multi-Stage Reconfigurable Optical Networks (다단계 재구성 가능한 광 네트워크상에서 가상 토폴로지 관리 정책)

  • Ji-Eun Keum;Lin Zhang;Chan-Hyun Youn
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • In this paper. we develop an analytical model to evaluate the virtual topology reconfiguration phase of optical Internet networks. To counter the continual approximation problem brought by traditional heuristic approach, we take the traffic prediction into consideration and propose a new heuristic reconfiguration algorithm called Prediction based Multi-stage Reconfiguration approach. We then use this analytical model to study the different configuration operation policies in response to the changing traffic patterns in the higher layer and the congestion level on the virtual topology. This algorithm persists to decide the optimal instant of reconfiguration easily based on the network state. Simulation results show that our virtual topology management Policy significantly outperforms the conventional one, while the required physical resources are limited.

RFID 정책 추진 방향

  • 조규조
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.2
    • /
    • pp.5-11
    • /
    • 2004
  • RFID 기술은 물품 등 관리할 사물에 아주 작은 전자태그를 부착하고 전파를 이용하여 사물의 정보 (Identification) 및 주변 환경정보를 자동으로 추출하여 관리하는 것으로 향후 IT 시장을 선도할 유망기술이다. 정보통신부는 RFID 기술을 기반으로 하는 정보화를 u-센서 네트워크(USN: Ubiquitous-Sensor Network)라는 개념으로 정립하였으며 기술개발 및 시범사업 등을 통하여 RFID 서비스를 활성화하고 u-센서 네트워크를 구축하여 국민소득 2만 달러 달성을 위한 IT 산업육성 정책을 적극적으로 추진할 계획이다.

An Integrated Network Management System using Management Information and Messages based on XML (XML.기반의 관리 정보와 메시지를 이용한 망관리시스템)

  • 정찬미;강지훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.331-333
    • /
    • 2003
  • 최근 네트워크 망이나 장비의 종류에 관계없이 다양한 망과 이기종간의 네트워크 장비를 통합하고 관리하기위한 시스템의 필요성이 증가하고 있다. 그러나 현재의 SNMP만으로 다양하고 복잡해지는 네트워크를 관리하기에는 많은 한계점이 존재한다. XML[11]은 정보교환을 목적으로 고안되었으며 기업들은 앞 다투어 어플리케이션에 XML을 도입하여 정보교환의 새로운 모델로 사용하고 있다. 현재 XML은 분산환경이나 상호운용을 필요로 하는 어플리케이션 사이의 정보교환의 새로운 형식으로 자리잡고 있다. 따라서 본 논문에서는 최근 네트워크 망이나 장비의 종류에 상관없이 다양한 망과 이기종간의 네트워크 장비를 통합하고 관리하기위한 시스템의 필요성이 증가하고 있다. 그러나 현재의 SNMP만으로 다양하고 복잡해지는 네트워크를 관리하기에는 많은 한계점이 존재한다. XML은 정보교환을 목적으로 고안되었으며 기업들은 앞 다투어 어플리케이션에 XML을 도입하여 정보교환의 새로운 모델로 사용하고 있다. 본 논문에서는 망관리시스템의 기본 관리정책과 SNMP PDU 메시지를 XML로 정의하여, 다양한 장비와 망을 그 종과 수에 관계없이 통합관리할 수 있는 통합망관리시스템의 프로토타입을 제안한다.

  • PDF

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

SDN-Based Middlebox Management Framework in Integrated Wired and Wireless Networks (유무선 통합망에서의 SDN 기반 미들박스 관리 프레임워크)

  • Lee, Giwon;Jang, Insun;Kim, Wontae;Joo, Sukjin;Kim, Myungsoo;Pack, Sangheon;Kang, Chul-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.379-386
    • /
    • 2014
  • Recently, middleboxes play a key role in many network settings such as firewalls, VPN gateways, proxies, intrusion detection and prevention systems, and WAN optimizers. However, achieving the performance and security benefits that middleboxes offer is highly complex, and therefore it is essential to manage middleboxes efficiently and dynamically. In this respect, Software-Defined Networking (SDN) offers a promising solution for middlebox policy enforcement by using logically centralized management, decoupling the data and control planes, and providing the ability to programmatically configure forwarding rules. Also, cloud computing and distributed Network Function Virtualization (NFV) can enable to manage middleboxes more easily. We introduce SDN-based middlebox management framework in integrated wired and wireless networks and discuss the further issues.