Design of policy-based security management for intrusion detection

被引:0
|
作者
Jo, SH [1 ]
Kim, JN [1 ]
Soh, SW [1 ]
机构
[1] ETRI, Informat Secur Res Div, Taejon, South Korea
关键词
IDS; COPS; IPsec; policy based security management;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is a next generation security solution that minimizes the damage of hacking, in case a firewall fails in the isolation of intrusions, and responds the intrusion dynamically. Legacy security management is difficult to deal with changes in security environments, because it lacks of security policies and integrated security methods. In order to resolve these problems, we need policy-based security management (PBSM) that has standard security policy, consulting, diagnosis, maintenance, and repair function. It is necessary to monitor and control security services by PBSM. In this paper, we design and implement PBSM for intrusion detection. Our platform consists of a network node, general hosts and a management node. The network node is a security router that performs packet filtering, intrusion detection, intrusion analysis, intrusion response, and policy enforcement. The management node manages a network node and general hosts by security policies. We design the channel between a management node and a network node using Common Open Policy Service (COPS) and IP Security (IPsec). We have applied java and web to implementing GUI for PBSM. Java is used to program the user interface for PBSM. As the proposed system makes use of web, PBSM is easily accessed through the web remotely in real time. As the proposed system makes use of Web, security management system is easily accessed through the Web.
引用
收藏
页码:337 / 340
页数:4
相关论文
共 50 条
  • [11] An improved reference flow control model for policy-based intrusion detection
    Zimmermann, J
    Mé, L
    Bidan, C
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 291 - 308
  • [12] Security and resource policy-based management architecture for ALAN servers
    Olukemi, T
    Liabotis, I
    Prnjat, O
    Sacks, L
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 91 - 102
  • [13] Policy-based security management for ad hoc wireless systems
    Zheng, Harold
    Wang, Sherry
    Nichols, Robert A.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
  • [14] Simulation model design of a security system based on a policy-based framework
    Seo, HS
    Cho, TH
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2003, 79 (09): : 515 - 527
  • [15] The development of policy proxy agent in policy-based network security management system
    Information Security Research Division, Electronics and Telecommunications Research Institute, 161, Gajeong-dong, Yuseong-gu, Daejeon City 305-350, Korea, Republic of
    WSEAS Trans. Commun., 2007, 1 (236-240):
  • [16] Dynamic conflict detection in policy-based management systems
    Dunlop, N
    Indulska, J
    Raymond, K
    SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 15 - 26
  • [17] Design and implementation of a policy-based resource management architecture
    Flegkas, P
    Trimintzios, P
    Pavlou, G
    Liotta, A
    INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 215 - 229
  • [18] Policy-based intrusion detection in web applications by monitoring Java information flows
    Hiet, Guillaume
    Tong, Valérie Viet Triem
    Mé, Ludovic
    Morin, Benjamin
    International Journal of Information and Computer Security, 2009, 3 (3-4): : 265 - 279
  • [19] Security and differentiated hotspot services through policy-based management architecture
    Fodil, I
    Jardin, V
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 517 - 532
  • [20] Sec-SNMP: Policy-based security management for sensor networks
    Wang, Qinghua
    Zhang, Tingting
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 222 - 226