Volume 34 Issue 8
Aug.  2008
Turn off MathJax
Article Contents
Xia Chunhe, Wei Yudi, Li Xiaojian, et al. Computer network defense policy model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(8): 925-929. (in Chinese)
Citation: Xia Chunhe, Wei Yudi, Li Xiaojian, et al. Computer network defense policy model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(8): 925-929. (in Chinese)

Computer network defense policy model

  • Received Date: 06 Sep 2007
  • Publish Date: 31 Aug 2008
  • Recent research on computer network defense is lack of a method which is able to model policy in high level and refine policy conveniently, hence computer network defense policy model (CNDPM) was presented to abstract network defense control behavior on the basis of organization based access control model (Or-BAC). The CNDPM provides a common method to model protection, detection and response policy, and introduces automatic assignment mechanism of role as well as view and activity to improve efficiency, also provides derivation principles to refine policy to concrete defense rule. Moreover, completeness, validity and consistency of policy are studied through formal analysis. The example shows that computer network defense policies modeled by CNDPM can be refined to defense rules conveniently and efficiently. The CNDPM model is characterized by good expansibility and practicability.

     

  • loading
  • [1] Sloman M S. Policy driven management for distributed systems[J]. Journal of Network and Systems Management,1994, 2(4):333-360 [2] Stern D F. On the buzzword "security policy" Security and Privacy. Los Alamitors:IEEE CS Press, 1991: 219-230 [3] 夏春和. 基于入侵诱骗的防御体系及关键技术研究 . 北京:北京航空航天大学计算机学院, 2003 Xia Chunhe. Research on intrusion-deception-based network defense architecture and key technology . Beijing: School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics,2003(in Chinese) [4] Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security Grid and Cooperative Computing. Berlin:Springer, 2004, 3252:437-439 [5] Moffett J D, Sloman M S. Policy hierarchies for distributed systems management[J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414 [6] Wies R. Using a classification of management policies for policy specification and policy transformation Integrated Network Management.London:Chapman Hill, 1995:44-56 [7] Katri Ylitalo. Policy core information model . 2000. http://www.cs.helsinki.fi/u/kraatika/Courses/QoS00a/ylitalo.pdf [8] Kim S Y, Kim M E, Kim K, et al. Information model for policy-based network security management Wired Communications and Management. Berlin:Springer, 2002, 2343: 662-672 [9] Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A network security policy model and its realization mechanism Information Security and Cryptology. Berlin:Springer, 2006,4318: 168-181 [10] Bartal Y, Mayer A J, Nissim K, et al. Firmato: a novel firewall management toolkit[J]. ACM Transactions on Computer Systems, 2004, 22(4):381-420 [11] Luck I, Schafer C, Krumm H. Model-based tool assistance for packet-filter design Policies for Distributed Systems and Networks. Berlin:Springer, 2001: 120-136 [12] Kalam A Abou El, Baida R El, Balbiani P, et al. Organization based access control Policies for Distributed Systems and Networks (POLICY'03).Lake Como:IEEE CS Press, 2003 :120-131 [13] Cuppens F, Cuppens-Boulahia N, Sans T, et al. A formal approach to specify and deploy a network security policy[J]. Second Workshop on Formal Aspects in Security and Trust, 2004 [14] Debar H, Thomas Y, Boulahia-Cuppens N, et al. Using contextual security policies for threat response Detection of Intrusions and Malware & Vulnerability Assessment. Berlin:Springer, 2006,4064:109-128 [15] 许国志. 系统科学[M]. 上海:上海科技教育出版社, 2000 Xu Guozhi. System science[M]. Shanghai: Shanghai Scientific and Technological Education Publishing House,2000(in Chinese) [16] Nstissc.National information systems security (infosec) glossary[S]. Nstissi No 4009: Nstissc,2000 [17] Sandhu R, Conyne E J, Lfeinstein H, et al. Role based access control models[J]. IEEE Computer,1996, 29(2):38-47
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2878) PDF downloads(1499) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return