Implementation of SLA-Based Security Policy Management for Cooperative Defense Network

碩士 === 國立中正大學 === 通訊工程學系 === 98 === As the development of the network technology, people rely on network more and more. The network security becomes more and more important. However, the scale of many network attacks is large now, such as DoS and DDoS. So, for the single defense host, the large-scal...

Full description

Bibliographic Details
Main Authors: Meng-Ru Yu, 余孟儒
Other Authors: Kim-Joan Chen
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/44891291780117424537
id ndltd-TW-098CCU05650101
record_format oai_dc
spelling ndltd-TW-098CCU056501012015-10-13T18:25:49Z http://ndltd.ncl.edu.tw/handle/44891291780117424537 Implementation of SLA-Based Security Policy Management for Cooperative Defense Network 以服務等級協定為基礎的網路安全聯防策略管理之研究與實作 Meng-Ru Yu 余孟儒 碩士 國立中正大學 通訊工程學系 98 As the development of the network technology, people rely on network more and more. The network security becomes more and more important. However, the scale of many network attacks is large now, such as DoS and DDoS. So, for the single defense host, the large-scale network attacks cause the paralysis of the host one by one. Immediately, the attack will spread to all computers of the world. So the most efficient defense method is to set up a cooperative defense network between the enterprises. In addition, every enterprise has its own requirement for security defense. So it is necessary to provide different security defense services for each enterprise. According to the requirement above, we propose a SLA-based cooperative defense network structure and a mechanism of the security policy management. Through our devices on the transport network, it will monitor the packet that includes the feature of attack. If it detects the behavior of attacks, it will send information of the attacks to the security policy decision system. Then the system will determine the security policy to achieve the regional cooperative defense. In addition, we also design the service level agreement of the security and Protection Type Profile (PTP) for customers to choose. And it offers different level security defense service. After the processing of defense, system will detect and analyze the security rules regularly to determine whether the attacks exist or not. Then the system will update the security rule according to the result of analysis. As a whole, this paper constructs the system to promote the ability of defense in the network. Kim-Joan Chen 陳景章 2010 學位論文 ; thesis 66 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 通訊工程學系 === 98 === As the development of the network technology, people rely on network more and more. The network security becomes more and more important. However, the scale of many network attacks is large now, such as DoS and DDoS. So, for the single defense host, the large-scale network attacks cause the paralysis of the host one by one. Immediately, the attack will spread to all computers of the world. So the most efficient defense method is to set up a cooperative defense network between the enterprises. In addition, every enterprise has its own requirement for security defense. So it is necessary to provide different security defense services for each enterprise. According to the requirement above, we propose a SLA-based cooperative defense network structure and a mechanism of the security policy management. Through our devices on the transport network, it will monitor the packet that includes the feature of attack. If it detects the behavior of attacks, it will send information of the attacks to the security policy decision system. Then the system will determine the security policy to achieve the regional cooperative defense. In addition, we also design the service level agreement of the security and Protection Type Profile (PTP) for customers to choose. And it offers different level security defense service. After the processing of defense, system will detect and analyze the security rules regularly to determine whether the attacks exist or not. Then the system will update the security rule according to the result of analysis. As a whole, this paper constructs the system to promote the ability of defense in the network.
author2 Kim-Joan Chen
author_facet Kim-Joan Chen
Meng-Ru Yu
余孟儒
author Meng-Ru Yu
余孟儒
spellingShingle Meng-Ru Yu
余孟儒
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
author_sort Meng-Ru Yu
title Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
title_short Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
title_full Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
title_fullStr Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
title_full_unstemmed Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
title_sort implementation of sla-based security policy management for cooperative defense network
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/44891291780117424537
work_keys_str_mv AT mengruyu implementationofslabasedsecuritypolicymanagementforcooperativedefensenetwork
AT yúmèngrú implementationofslabasedsecuritypolicymanagementforcooperativedefensenetwork
AT mengruyu yǐfúwùděngjíxiédìngwèijīchǔdewǎnglùānquánliánfángcèlüèguǎnlǐzhīyánjiūyǔshízuò
AT yúmèngrú yǐfúwùděngjíxiédìngwèijīchǔdewǎnglùānquánliánfángcèlüèguǎnlǐzhīyánjiūyǔshízuò
_version_ 1718032606440718336