首页> 外文期刊>International Journal of Information Security >Complete analysis of configuration rules to guarantee reliable network security policies
【24h】

Complete analysis of configuration rules to guarantee reliable network security policies

机译:完整分析配置规则,以确保可靠的网络安全策略

获取原文
获取原文并翻译 | 示例
           

摘要

The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management.
机译:使用不同的网络安全组件(例如防火墙和网络入侵检测系统(NIDS))是监视和保证当前公司网络中安全策略的主要方法。要正确配置这些组件,必须使用几组安全规则。但是,这些规则之间存在异常,尤其是在分布式多组件方案中,很可能会降低网络安全策略。这些异常的发现和消除是一个严重而复杂的问题。在本文中,我们介绍了用于此类管理的完整机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号