Font Size: a A A

The Application Of STAT Technology In Network Security Management

Posted on:2009-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z G SongFull Text:PDF
GTID:2178360242477101Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The current security measures have been unable to adapt to new environments and attack tactics.As a result, more and more security equipments are deployed in the network.Although these security equipments protect the network in some aspects,they always work independently,and can't interact with each other.What's more, these equipments become the new problem of the network to manage them.The solution is to establish a network security management platform.The network security model is the key to establish a network security management platform. The network security model has been developed from static defensive to dynamic defensive, and P2DR model is the representative model.P2DR model establishes a dynamic protection mechanism which takes the security policy as the core,dividing the security protection into protection,detection and response stages.All these stages run under the guidance of security policy.But the problem with P2DR is that it is hard to associate the stages in real network security management platform.In this article,the STAT technology is firstly used to solve the problem.STAT considers the stages as the different states.Then through the states transfer,it realizes the interaction of different security equipments.The STAT technology is also used in an actual network security management platform project to realize data aggregation and risk assessment.
Keywords/Search Tags:network security management, stat, p2dr, data aggregation
PDF Full Text Request
Related items