Font Size: a A A

Research Of Network Security Policy Monitoring Model And Key Technologies

Posted on:2010-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:J PengFull Text:PDF
GTID:2178360278480835Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the security management, security policy management becomes a hotspot in the research of imformation security. Otherwise, few people concerned the research of the policy monitoring technology, which is one of the most important components in the policy management that guarantee the whole security of the system.The monitoring technology has been wildly used in the network management and the resourse management. Therefore, the policy monitoring technology will be a hotspot of the policy research in the future.In this paper, we study the policy and the content interralated of network security devices to solve the policy monitoring problem. The main works of this paper are as follows:1. Propose the states translation theory in the whole life of the policy. Build a policy monitoring model based on the FSA. According to the policy lifecycle and the FSA theory, we build the policy states translation model, which provides us the academic guidance for the study.2. Design the common monitoring message channel for the phase of policy monitoring which can be used for the capture of the monitoring events. Then the policy states can be changed or the illegal events would be alarmed to the manager.3. Propose a double spots detection mechanism for the policy working states monitoring for the acquisition of the policy enforment data; and a transport protocol is designed for the monitoring data transporting based on BEEP, which settled the teledata's transportting to the policy monitoring platform.4. Based on the research above, we design and implement the policy monitoring prototype system PMS.Policy monitoring technology is a new field in the policy theory. According to the need of the project, we study on the policy monitoring in the policy management system, which provide theoretical and technical supports for constructing security environment.
Keywords/Search Tags:Policy Monitoring, Policy State, Finit State Automata, Message Channel, Message Confilict preventing, Double Spots Dectection, Policy Monitoring Data Transport Protocol
PDF Full Text Request
Related items