A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism

Author(s):  
Chenghua Tang ◽  
Shunzheng Yu
2014 ◽  
Vol 644-650 ◽  
pp. 2996-2999
Author(s):  
Kai Qi Fan

The rapid development and wide application of computer network is a new challenge to information security and network security. Traditional security models and single security technology can not keep up with the change of complex network structure and alterable intrusion measure. Based on analysis of some classical security models and technologies, we think network security is a kind of dynamic security. So, this paper presents a dynamic self-adaptive network security model based on mobile agent, and emphases on its structure, control strategy and prototype implementation.


2013 ◽  
Vol 846-847 ◽  
pp. 1784-1788
Author(s):  
Chang Wei Huang ◽  
Jin Quan Xiong

Taking dynamic self-adaptive network security model system of the whole network as theoretical guidance, this thesis analyzes security risks faced by campus network completely and in full detail, combining with the network system features. The current mainstream of network security technologies such as firewalls, intrusion detection,VPN, certification, and others are carefully studied to illustrate security technologies which shall be focused for the campus network security. Then, taking the Jiangxi Science and Technology Normal University campus network as an example, the specific characteristics of campus network are considered to analyze the reality of network security and to design campus network security solutions, which have strong relevance and feasibility.


2011 ◽  
Vol 403-408 ◽  
pp. 1364-1367
Author(s):  
Ren Xiang Shao ◽  
Li Wan

The article sets up a self-adaptive network test model and introduces a system for the course “Linear Algebra”. The system can present different problems on the basis of tester level and the process of answering question. The system may reduce the amount of test question, shorten the time of the test and estimate more accurately the level of the tester relative to tradition test. The paper has certain direction meaning for tester self-test and computer assistant test.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2010 ◽  
Vol 1 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Janne Lindqvist ◽  
Essi Vehmersalo ◽  
Miika Komu ◽  
Jukka Manner

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.


Author(s):  
Joe Levy ◽  
Khai Tran ◽  
Patrick Lydon ◽  
Jeremy Pollock ◽  
Dave Parry ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document