網(wǎng)絡(luò)安全設(shè)備聯(lián)動(dòng)策略的研究與應(yīng)用
[Abstract]:Policy-based network security equipment linkage management can ensure the cooperative work of the security equipment in the system, effectively integrate the system resources, improve the detection accuracy and processing efficiency of security incidents, so as to deal with the increasingly complex network security threats. It becomes the core of dynamic security equipment management model. Based on the policy management framework established by IETF and the security equipment linkage system model, this paper deeply studies the description, verification, search and execution of the linkage policy. Firstly, in terms of the definition and description of the linkage policy, according to the cooperation of the security equipment in the subnet, the security domain is divided according to the subnet, and the linkage policy is defined as the security domain, the trigger condition and the execution rule set triple. The trigger condition represents the security event threat captured by the system, while the rule set represents a set of configuration actions that the system needs to take to execute the policy. Secondly, in the linkage strategy verification. The process of handling security events is the starting process of all kinds of related processes in the security domain. The state transition model of directed graph for a specific subnet is constructed by using the opening or closing state of the linkage device process as the state node and the security event that leads to the transition of the state node as the edge. Causes an execution action in a rule set to correspond to a state transition in a directed graph. Based on the depth-first traversal of directed graphs, the transition paths of each state node are investigated to verify the correctness, integrity, consistency, redundancy and executability of the linkage strategy. Third, in the linkage strategy query aspect. The query problem of linkage strategy is also transformed into the traversal problem of directed graph. In order to ensure that high frequency security events can be retrieved first, the frequency of events is considered when constructing the adjacent table of directed graph. The directed graph is divided into several subgraphs according to the number of terminating nodes, and the frequency of security events is transformed into the dissipative value of the path, and the heuristic function is defined by the latest time of occurrence of events in AOE nets. The algorithm of A * search is used to complete the sorting of the state nodes in the Closed table, and the adjacent table is constructed by synthesizing the reordered nodes of each subgraph. Finally, in the linkage strategy execution aspect. The remote configuration of security devices is realized by SSH protocol, which ensures the security of policy execution and realizes the compatibility of SSH versions of different devices. The experimental results show that the proposed policy verification algorithm is superior to some existing methods in complexity and has good execution efficiency, and the policy query method in this paper can effectively respond to high frequency events. Combined with the method of remote configuration of security equipment through SSH protocol, the method described in this paper can be used to construct a policy-based network security device linkage system, which can effectively deal with all kinds of security threats.
【學(xué)位授予單位】:華北電力大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前9條
1 李力;李志平;王亮;呂航;文繼鋒;陳松林;;穩(wěn)定控制裝置中策略搜索匹配狀態(tài)機(jī)模型[J];電力系統(tǒng)自動(dòng)化;2012年17期
2 張煥;曹萬華;馮力;朱麗娜;;基于狀態(tài)遷移的網(wǎng)絡(luò)安全聯(lián)動(dòng)策略模型[J];艦船電子工程;2009年03期
3 姚鍵 ,茅兵 ,謝立;一種基于有向圖模型的安全策略沖突檢測(cè)方法[J];計(jì)算機(jī)研究與發(fā)展;2005年07期
4 劉道斌;郭莉;白碩;;一種工作流安全策略分析方法[J];計(jì)算機(jī)研究與發(fā)展;2008年06期
5 李衛(wèi),劉小剛,李國(guó)棟,繆紅保,陶靜;網(wǎng)絡(luò)安全管理及安全聯(lián)動(dòng)響應(yīng)的研究[J];計(jì)算機(jī)工程與應(yīng)用;2003年26期
6 包義保;殷麗華;方濱興;郭莉;;基于良基語義的安全策略表達(dá)與驗(yàn)證方法[J];軟件學(xué)報(bào);2012年04期
7 姚蘭,王新梅;防火墻與入侵檢測(cè)系統(tǒng)的聯(lián)動(dòng)分析[J];信息安全與通信保密;2002年06期
8 梁琳,拾以娟,鐵玲;基于策略的安全智能聯(lián)動(dòng)模型[J];信息安全與通信保密;2004年02期
9 何恩,李毅;一種基于策略的網(wǎng)絡(luò)安全聯(lián)動(dòng)框架[J];信息安全與通信保密;2005年07期
本文編號(hào):2227083
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/2227083.html