Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
碩士 === 國立中正大學 === 通訊工程學系 === 98 === As the development of the network technology, people rely on network more and more. The network security becomes more and more important. However, the scale of many network attacks is large now, such as DoS and DDoS. So, for the single defense host, the large-scal...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/44891291780117424537 |
id |
ndltd-TW-098CCU05650101 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098CCU056501012015-10-13T18:25:49Z http://ndltd.ncl.edu.tw/handle/44891291780117424537 Implementation of SLA-Based Security Policy Management for Cooperative Defense Network 以服務等級協定為基礎的網路安全聯防策略管理之研究與實作 Meng-Ru Yu 余孟儒 碩士 國立中正大學 通訊工程學系 98 As the development of the network technology, people rely on network more and more. The network security becomes more and more important. However, the scale of many network attacks is large now, such as DoS and DDoS. So, for the single defense host, the large-scale network attacks cause the paralysis of the host one by one. Immediately, the attack will spread to all computers of the world. So the most efficient defense method is to set up a cooperative defense network between the enterprises. In addition, every enterprise has its own requirement for security defense. So it is necessary to provide different security defense services for each enterprise. According to the requirement above, we propose a SLA-based cooperative defense network structure and a mechanism of the security policy management. Through our devices on the transport network, it will monitor the packet that includes the feature of attack. If it detects the behavior of attacks, it will send information of the attacks to the security policy decision system. Then the system will determine the security policy to achieve the regional cooperative defense. In addition, we also design the service level agreement of the security and Protection Type Profile (PTP) for customers to choose. And it offers different level security defense service. After the processing of defense, system will detect and analyze the security rules regularly to determine whether the attacks exist or not. Then the system will update the security rule according to the result of analysis. As a whole, this paper constructs the system to promote the ability of defense in the network. Kim-Joan Chen 陳景章 2010 學位論文 ; thesis 66 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 通訊工程學系 === 98 === As the development of the network technology, people rely on network more and more. The network security becomes more and more important. However, the scale of many network attacks is large now, such as DoS and DDoS. So, for the single defense host, the large-scale network attacks cause the paralysis of the host one by one. Immediately, the attack will spread to all computers of the world. So the most efficient defense method is to set up a cooperative defense network between the enterprises. In addition, every enterprise has its own requirement for security defense. So it is necessary to provide different security defense services for each enterprise.
According to the requirement above, we propose a SLA-based cooperative defense network structure and a mechanism of the security policy management. Through our devices on the transport network, it will monitor the packet that includes the feature of attack. If it detects the behavior of attacks, it will send information of the attacks to the security policy decision system. Then the system will determine the security policy to achieve the regional cooperative defense. In addition, we also design the service level agreement of the security and Protection Type Profile (PTP) for customers to choose. And it offers different level security defense service. After the processing of defense, system will detect and analyze the security rules regularly to determine whether the attacks exist or not. Then the system will update the security rule according to the result of analysis. As a whole, this paper constructs the system to promote the ability of defense in the network.
|
author2 |
Kim-Joan Chen |
author_facet |
Kim-Joan Chen Meng-Ru Yu 余孟儒 |
author |
Meng-Ru Yu 余孟儒 |
spellingShingle |
Meng-Ru Yu 余孟儒 Implementation of SLA-Based Security Policy Management for Cooperative Defense Network |
author_sort |
Meng-Ru Yu |
title |
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network |
title_short |
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network |
title_full |
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network |
title_fullStr |
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network |
title_full_unstemmed |
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network |
title_sort |
implementation of sla-based security policy management for cooperative defense network |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/44891291780117424537 |
work_keys_str_mv |
AT mengruyu implementationofslabasedsecuritypolicymanagementforcooperativedefensenetwork AT yúmèngrú implementationofslabasedsecuritypolicymanagementforcooperativedefensenetwork AT mengruyu yǐfúwùděngjíxiédìngwèijīchǔdewǎnglùānquánliánfángcèlüèguǎnlǐzhīyánjiūyǔshízuò AT yúmèngrú yǐfúwùděngjíxiédìngwèijīchǔdewǎnglùānquánliánfángcèlüèguǎnlǐzhīyánjiūyǔshízuò |
_version_ |
1718032606440718336 |