Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network
碩士 === 國立中正大學 === 通訊工程研究所 === 96 === As the development of wireless network technology grows abundantly and e-commerce are becoming more widely used, users can access network resources seamlessly and transmission confidential data. However, the process of mobility will cause many security faults, th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/61835928476711112899 |
id |
ndltd-TW-096CCU05650067 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096CCU056500672016-05-04T04:25:46Z http://ndltd.ncl.edu.tw/handle/61835928476711112899 Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network 以服務等級協定為基礎具合作與認知之軟性網路安全與管理的研究與開發 Jain-Syun Chain 陳建勳 碩士 國立中正大學 通訊工程研究所 96 As the development of wireless network technology grows abundantly and e-commerce are becoming more widely used, users can access network resources seamlessly and transmission confidential data. However, the process of mobility will cause many security faults, thus the importance of Internet and Information security is emerged. Traditional internet security and management are partial to network resources control and maintain, such as deploy Firewall and IDS to resist the attack from outside but ignore the virus, hacker and improper access processes inside organization. Furthermore, the scale of many attacks are large, like PortScan, DoS, DDoS, Virus, Worm, cause the paralysis of the network or the host computer one by one, may spread whole world overnight. In addition, the current business or organization has only one specific network security strategy, can not be based on the security requirement of users provided different security defense strategy. In this paper, we propose a cooperative security and management mechanism on soft network. Deploy our design devices on transport network provider, if detect intruders or abnormal traffic to notify each other to achieve regional defense. Also design a security SLA and Protection Type Profile(PTP), allow customer choose security level and protection types, offer different level security service and network management service. Otherwise, our architecture contains a mobile-aware Layer 2 and Layer 3 System that can change the settings according to the current moving status of the user. Safety goals will be met using these techniques for the user in a ubiquitous coverage. Kim-Joan Chen 陳景章 2008 學位論文 ; thesis 54 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 通訊工程研究所 === 96 === As the development of wireless network technology grows abundantly and e-commerce are becoming more widely used, users can access network resources seamlessly and transmission confidential data. However, the process of mobility will cause many security faults, thus the importance of Internet and Information security is emerged.
Traditional internet security and management are partial to network resources control and maintain, such as deploy Firewall and IDS to resist the attack from outside but ignore the virus, hacker and improper access processes inside organization. Furthermore, the scale of many attacks are large, like PortScan, DoS, DDoS, Virus, Worm, cause the paralysis of the network or the host computer one by one, may spread whole world overnight. In addition, the current business or organization has only one specific network security strategy, can not be based on the security requirement of users provided different security defense strategy.
In this paper, we propose a cooperative security and management mechanism on soft network. Deploy our design devices on transport network provider, if detect intruders or abnormal traffic to notify each other to achieve regional defense. Also design a security SLA and Protection Type Profile(PTP), allow customer choose security level and protection types, offer different level security service and network management service. Otherwise, our architecture contains a mobile-aware Layer 2 and Layer 3 System that can change the settings according to the current moving status of the user. Safety goals will be met using these techniques for the user in a ubiquitous coverage.
|
author2 |
Kim-Joan Chen |
author_facet |
Kim-Joan Chen Jain-Syun Chain 陳建勳 |
author |
Jain-Syun Chain 陳建勳 |
spellingShingle |
Jain-Syun Chain 陳建勳 Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network |
author_sort |
Jain-Syun Chain |
title |
Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network |
title_short |
Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network |
title_full |
Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network |
title_fullStr |
Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network |
title_full_unstemmed |
Design of SLA-Based Cooperative Security and Management Mechanism on Soft Network |
title_sort |
design of sla-based cooperative security and management mechanism on soft network |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/61835928476711112899 |
work_keys_str_mv |
AT jainsyunchain designofslabasedcooperativesecurityandmanagementmechanismonsoftnetwork AT chénjiànxūn designofslabasedcooperativesecurityandmanagementmechanismonsoftnetwork AT jainsyunchain yǐfúwùděngjíxiédìngwèijīchǔjùhézuòyǔrènzhīzhīruǎnxìngwǎnglùānquányǔguǎnlǐdeyánjiūyǔkāifā AT chénjiànxūn yǐfúwùděngjíxiédìngwèijīchǔjùhézuòyǔrènzhīzhīruǎnxìngwǎnglùānquányǔguǎnlǐdeyánjiūyǔkāifā |
_version_ |
1718257684524826624 |