The development of policy proxy agent in policy-based network security management system

  • Authors:
  • Geonlyang Kim;Hyochan Bang;Jungchan Na;Jongsu Jang

  • Affiliations:
  • Information Security Research Division, Electronics and Telecommunications Research Institute, Gajeong-dong, Yuseong-gu, Daejeon City, Republic of Korea;Information Security Research Division, Electronics and Telecommunications Research Institute, Gajeong-dong, Yuseong-gu, Daejeon City, Republic of Korea;Information Security Research Division, Electronics and Telecommunications Research Institute, Gajeong-dong, Yuseong-gu, Daejeon City, Republic of Korea;Information Security Research Division, Electronics and Telecommunications Research Institute, Gajeong-dong, Yuseong-gu, Daejeon City, Republic of Korea

  • Venue:
  • ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security and management of network have become more important because users of network have increased and services of network have been diverse. Many security devices have been developed for securing A large network. But, attacks and damages for the network have not been stopping. So, a study for network security is needed continuously. This paper describes a technique relative to a policy based network security management system managing network security devices centrally. Policy Framework doesn't configure each device separately but centrally. So it is effective for managing large network. Policy Framework is easy to configure diverse systems, provides the method managing those transparently. But, if Policy Framework can't use legacy devices that are arranged and used at current network, that isn't useful. And if Policy Framework don't use legacy devices but only policy clients, much cost and effort will be consumed for installing and arranging policy clients. This paper describes the method using legacy devices that already is arranged and used at network in Policy Framework. This method allows you to manage network security devices with small cost and effort centrally and efficiently.