Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Understanding policy-based networking
Understanding policy-based networking
Data Mining and Uncertain Reasoning: An Integrated Approach
Data Mining and Uncertain Reasoning: An Integrated Approach
Policy-Based Networking: Architecture and Algorithms
Policy-Based Networking: Architecture and Algorithms
Theory of Modeling and Simulation
Theory of Modeling and Simulation
Simplifying network administration using policy-based management
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
There are many security vulnerabilities in computer systems. They can be easily attacked by outsiders or abused by insiders who misuse their rights or who attack the security mechanisms in order to disguise as other users or to detour the security controls. Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. This article describes the modeling and simulation of a security system based on a policy-based network that has some merits. We present how the policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are inducted, and how the policy rules are transformed into PCIM (Policy Core Information Model). In the network security environment, each simulation model is hierarchically designed by DEVS (Discrete EVent system Specification) formalism.