Title :
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism
Author :
Tang, Chenghua ; Yu, Shunzheng
Author_Institution :
Dept. of Electr. & Commun. Eng., Zhongshan (Sun Yat-Sen) Univ., Guangzhou
Abstract :
Using high-level security policy rules to regulate low-level system, the security management system with a high level of expansibility and flexibility was made. For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, a dynamic and self-adaptive security policy realization mechanism is proposed. The accident monitor and policy life-cycle are put forward, and the impact of safety equipment or user requests, such as system resources found on the flow control can be calculated automatically. The system can independently carry out a dynamic, flexible and real-time to adjust and control in the network environment and security needs change. The distribution model is given to response policy request rapidly, take the appropriate policy dissemination methods, and reduce PDP computing tasks, system resource consumption, which introduces the concepts of issue affecting factors, security domain addresses allocation, etc. Expression and making ways of the structure-dissimilarity policy faced on attribute characters and operation are analyzed emphatically. The effectiveness of the proposed model and algorithms is proved by experiments.
Keywords :
complex networks; computer network management; computer network reliability; telecommunication security; complex network environment; dissemination method; distribution model; dynamic network security policy realization mechanism; high-level security policy rule; network accident monitor; security management system; self-adaptive network security policy realization mechanism; structure-dissimilarity policy; Accidents; Automatic control; Complex networks; Computerized monitoring; Control systems; Distributed computing; Environmental management; Real time systems; Resource management; Safety devices; Network security policy; PDP; PEP; policy life-cycle; security domain; structure-dissimilarity;
Conference_Titel :
Network and Parallel Computing, 2008. NPC 2008. IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3354-4
DOI :
10.1109/NPC.2008.41