Design and Application of a Policy-Driven Interactive Security Model

Article Preview

Abstract:

t is difficult to build a perfect security system due to passive protection methods or isolative security devices. Principles of several interactive models are analyzed at first. And then a policy-driven interactive security model, which implements an integrated security system between many devices by the interactive policy, is proposed. At last, some application patterns of the model are discussed in a typical network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2717-2720

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yin Shuming, Research and design of security defense architecture based on firewall and intrusion detection, Changsha: Central South University, Master thesis, (2005).

Google Scholar

[2] Wang Wenqi, Research on intrusion detection and coordinated-control of security protection, " Xi, an: Northwestern Polytechnical University, Ph. D thesis, (2006).

Google Scholar

[3] Huseyin Cavusoglu, Srinivasan Raghunathan, Hasan Cavusoglu, Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems, Information systems research, 20(2), 2009, pp.198-217.

DOI: 10.1287/isre.1080.0180

Google Scholar

[4] Baoyi Wang, Haipeng Yang, Shaomin Zhang, Research on application of interaction firewall with IDS in distrbution automation system, Advances in electronic engineering, communication and management Vol. 1, Lecture notes in electrical engineering, Vol. 139, 2012, pp.527-532.

DOI: 10.1007/978-3-642-27287-5_84

Google Scholar

[5] Jiang Ji, IDS and firewall interaction mechanisms and security protocols, Kunming: Kunming University of Science and Technology, Master thesis, (2006).

Google Scholar

[6] Wang Baoping, Zhang Zhe, Zhang Xingang, Research of IDS and router coupling based on UPnP and Iptables, Journal of Henan University (Natural Science), 39(4) , 2009, pp.424-427.

Google Scholar

[7] Dang Rui, Research of interaction between intrusion detection and honeypot, " Xi, an: Northwestern Polytechnical University, Master thesis, (2004).

Google Scholar