Policy-based Security Surveillance Framework on a Large Scale Network

نویسندگان

  • Eunyoung Park
  • Sungwon Kim
چکیده

Security management and maintenance are difficult in a large scale network because there are many different kinds of security tools which each has its own information model and policy. We introduce a framework for policy-based security surveillance in a large network which has various security tools. The framework is based on the manager-agent concept. The central manager stores security policies and monitors network topology and states in real time. An agent installed in a managed node reports the security related state to the manager and executes management commands received from the manager. When the manager finds a change in the network topology or state, it checks if the state of network after the change conforms to security policies. If any deviation is found, the manager plans/executes management commands to return the network into the state conforming to the policies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constructive Dynamisms of Large-Scale Urban Projects by the Space Political Economy Approach; a Case Study of Mashhad Metropolis

Aims: The development of large-scale construction projects has transformed the shape of cities towards specific objectives and based on economic and political perspectives that dominate policy-making and planning in cities. The purpose of the research was to study and analyze the spatiality of Mashhad construction mega-projects and to explain the constructive forces and dynamisms of these proje...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Determination of Composite System Adequacy Equivalents Using a Reduction Technique: a Case Study on a Regional Electric Company

Reliability evaluation of a large-scale composite power system faces to numerous events/outage and consequently imposes an extensive burden of calculations. In order to simplify the problem, determination of an equivalent system for large-scale power system is inevitable. This paper proposes a framework as reduction technique to separate a composite power system to three areas: external area, o...

متن کامل

An Intelligent Threat Prevention Framework with Heterogeneous Information

Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects’ intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security t...

متن کامل

Stakeholders\' network in Iranian health policy-making: A model for participatory policy-making

Background: Stewardship, resource generation, financing, and providing services are the 4 main functions in any health system. Using intelligence and common sense in making policies and decisions is a subcomponent of the stewardship. The present study aimed at designing a model that provides better access to the stakeholders’ wisdom.    Methods: This was a qualitative study in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003