• Title/Summary/Keyword: 정책기반 네트워크 관리

Search Result 283, Processing Time 0.033 seconds

An event-based timeout policy to decrease the overhead of session managements in network systems (네트워크 시스템의 세션 관리 부하를 감쇄하기 위한 사건 기반 타임아웃 정책)

  • Yim, Kang-bin;Choi, Chang-seok;Moon, Jong-wook;Jung, Gi-hyun;Choi, Kyung-hee
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.143-148
    • /
    • 2004
  • The session management overhead on the network systems like firewalls or intrusion detection systems is getting grown as the session table is glowing. In this paper. we propose the event-based timeout management policy to increase packet processing throughput on network systems by decreasing the system's timeout management overhead that is comparable to the existing time-based timeout management policies. Through some empirical studies using a session management system implemented in this paper we probed that the proposed policy provides better packet processing throughput than the existing policies.

Policy-based Grid Workflow Management System for Metabolic Syndrome Identification (대사 증후군 질병 진단을 위한 정책 기반 그리드 워크플로우 관리 시스템)

  • Jung, Woo-Ram;Kim, Hoe-Youn;Youn, Chan-Hyun;Choi, Yeon-Sik;Hong, Hyuck-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.950-953
    • /
    • 2009
  • 컴퓨팅 및 네트워크 기술이 발전함에 따라 그리드 응용의 복잡도 및 컴퓨팅 요구사항이 커지게 되었으며, 이로 인해 그리드 워크플로우 관리 기술의 중요성이 더욱 부각되었다. 이러한 복잡한 그리드 응용을 위해 다양한 그리드 워크플로우 관리 시스템이 개발되었으나 사용자의 요구사항에 대한 고려, 안정성 그리고 사용자와의 상호작용 등의 기능이 부족하였으며 특히 자원관리 기능에 대한 지원이 부족하였다. 본 논문에서는 기존의 응용 친화적인 워크플로우 관리 시스템과 그리드 워크플로우 관리 시스템을 정책 기반 메커니즘을 이용, 통합하여 새로운 Hybrid 형태의 워크플로우 관리 시스템을 제안하였으며, 제안하는 방법이 어떻게 사용자의 요구수준을 만족시킬 수 있는지를 서술하고 이를 대사증후군을 위한 질병진단 시스템에 적용하여 실험적으로 증명하였다.

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안관리 시스템에서의 침입탐지 및 대응을 위한 보안 정책 모델에 관한 연구)

  • Kim, Seok-Hun;Kim, Eun-Soo;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.9-17
    • /
    • 2005
  • Recently It's difficult to deal with about variety of attack. And Simple Security management have a problem. It is that they don't develop system measuring their system envoirment and have efficient attack detector, countermeasure organization about large network. Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

Active PDP Discovery for PBNM in MANETs (MANETs에서 정책기반 망 관리를 위한 Active PDP Discovery)

  • Lee Kyung-Jin;Song Wang-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.390-396
    • /
    • 2006
  • Policy-based Network Management(PBNM) in the Mobile Ad-hoc network(MANETs) requires additional, reliable and efficient mechanism over PBNM in wired network. Thus, it is important that the management system in MANETs should cluster the moving nodes and manage their movements in an effective manner. In this thesis, I propose a mechanism for the policy-based management in ad hoc networks in which I consider several methods to discover the Policy Decision Point(PDP), set the management area, and manage the movements of Policy Enforcement Point(PEP) nodes in the PBNM system. Moreover, COPS-PR is extended for the mechanism. Finally, I analyze and validate the results through simulations.

Implementation of Security Policies of ONSU-MF(One Network Security Unit-Multi Function) and OSD-MD(One Security Device-Multi Defense) (ONSU-MF(One Network Security Unit-Multi Function)기법과 OSD-MD(One Security Device-Multi Defense)기법 기반의 보안정책 구현)

  • Seo, Woo-Seok;Lee, Gyn-An;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.317-326
    • /
    • 2011
  • This study is meaningful in that it standardizes various security and defense policies and devices, newly defines characteristics of defense policies and defense techniques, and specify and report various kinds of security polities and devices in order for administrators or users to add and apply the policies when introducing new security policies including the implementation of existing network infra and applying additionally. Therefore, this study aims to divide the policies into ONSU-MF(One Network Security Unit-Multi Function) that classifies one network security device-based policies and OSD-MD(One Security Device-Multi Defense), which implements various security methods by using one security device, and suggest network security infra improvement mechanism through the standardization implementation technique integrating the two methods.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

The Design of LSM-Based Extended RBAC Security System (리눅스 보안 모듈 기반의 확장된 역할 기반 접근 제어 보안 시스템 설계)

  • 박신혜;예흥진;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.628-630
    • /
    • 2003
  • 오늘날의 규모가 매우 크고 복잡한 시스템 및 네트워크 환경 하에서 컴퓨터 시스템의 보안 관리는 매우 중요하다. 역할기반 접근제어 (RBAC : Role-Based Access Control)는 시스템 상의 역할을 기반으로 하는 접근제어 메커니즘으로 복잡한 접근정책을 기술하고, 시스템 관리상의 에러와 비용을 줄일 수 있다. 본 논문은 리눅스 커널에 보안 강화를 지원하는 리눅스 보안 모듈(LSM: Liunx Security Module) 프레임워크 상에서 확장된 역할기반 접근제어 보안 시스템 (LSM-Based Extended RBAC Security Module)을 제안한다. 본 고에서 제안된 시스템은 보안의 강화를 위하여 원 타임 패스워드 (One-Time Password)의 강화된 인증 방식과 부분적 다중 계층 보안 (Partial Multi-Level Security), 임의적 접근 제어(Discretionary Access Control) 및 감사 정보를 통한 보안 정책 오류 검사 및 대응 (Security Policy Validation and Response) 기능을 지원한다.

  • PDF

Document Replacement Policy Considering Site Popularity (사이트의 인기도를 고려한 도큐먼트 교체정책)

  • 유행석;장태무
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.178-180
    • /
    • 2002
  • 대부분의 웹 캐시는 도큐먼트를 기반으로 하여 캐시 내에 임시적으로 도큐먼트를 저장하고 사용자의 요청이 있을 때 그에 해당된 도큐먼트가 캐시 내에 존재하면 그 도큐먼트를 사용자에게 전송해 주고, 캐시 내에 존재하지 않을 때에는 새로운 도큐먼트를 서버에게 요청하여 캐시 내에 복사를 하고 사용자에게 되돌려 준다. 이때 캐시의 용량 초과로 인해 새로운 도큐먼트를 기존의 도큐먼트와 교체하기 위해 도큐먼트 교체정책(replacement police)을 사용한다. 일반적인 교체정책에는 도큐먼트를 기반으로 한 LRU기법이나 LFU기법 등이 있고, 이러한 여러 가지 교체정책을 사용하여 캐시내의 도큐먼트를 효과적으로 교체한다. 하지만, 위의 교체정책은 사이트의 인기도를 고려하지 않고 도큐먼트 요청 빈도수 만을 고려하여 교체정책을 수행한다. 따라서 본 논문에서는 요청이 빈번한 도큐먼트와 사이트의인기도를 고려한 교체정책을 사용하여 요청이 빈번하지 않은 도큐먼트를 효과적으로 교체함으로써 캐시의 적중률(hit-rate)을 높이고, 캐시의 내용을 효과적으로 관리할 수 있는 현대적인 네트워크 환경에 적합한 도큐먼트 교체정책인 사이트의 인기도를 고려한 도큐먼트 교체 정책을 제시한다.

  • PDF

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.