Font Size: a A A

The Research Of Network Security Equipment Linkage Strategies Based On The State Transition

Posted on:2016-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y L GuoFull Text:PDF
GTID:2308330470974961Subject:Computer technology
Abstract/Summary:PDF Full Text Request
This paper designed a network security equipment linkage strategy based on state transition management model.This model can efficiently configuration system resources, the network security devices in the system can work together, it guarantee the system work in all kinds of security incidents accurately detection processing.In the face of increasingly complex network environment and the increasingly serious threats, this model can better security protection, it is the core of the whole safety equipment management system.This paper presents a network security equipment linkage system framework and strategy management model.Among them, the network security equipment linkage system framework consists of equipment management, event management and policy makers;and strategic management model made up of physical layer, state layer and service layer.First of all, structure strategy and verify the effectiveness of the strategy in the service layer, the verification including: completeness, correctness, consistency of verification and the redundancy of the validation, and analyze the strategy of authentication methods. Secondly, in the state and the service layer, completed the security policy state transition model structure.It is divided into system policy set migration process model and running strategy set migration process model.And according to the state transition diagram to validate the constructed model, adopting the method of goodness of fit is used to evaluate the result of the experiment.Finally, according to the first four chapters of research results, achieve the equipment linkage system based on state transition, draw the system running environment and structure diagram, design each of security policy configuration of the action,then run the system and Realize the system protection function.
Keywords/Search Tags:Network security, Security device linkage policy, Validation strategy, State transition
PDF Full Text Request
Related items