MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies
نویسندگان
چکیده
We present the core functionality of MIRAGE, a management tool for the analysis and deployment of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN routers. We review the two main functionalities embedded in our current prototype: (1) a bottom-up analysis of already deployed network security configurations and (2) a top-down refinement of global policies into network security component configurations. In both cases, MIRAGE provides intra-component analysis to detect inconsistencies in single component deployments; and inter-component analysis, to detect multicomponent deployments which are not consistent. MIRAGE also manages the description of the security architecture topology, to guarantee the proper execution of all the processes.
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملOptimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach
Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...
متن کاملProvide Strategies to Reduce Administrative Corruption in Public Organizations IT-Based Using a Combination of Analytic Network Process and Quality Function Deployment Model QFD
The purpose of this research to prioritize the factors affecting administrative corruption in government organizations using analytic network process until the arrival of prioritized dimensions to Quality Function Deployment model, provide appropriate strategies for solving this basic organizational problem.This study is a descriptive survey research and located into the category of applied res...
متن کاملProvide Strategies to Reduce Administrative Corruption in Public Organizations IT-Based Using a Combination of Analytic Network Process and Quality Function Deployment Model QFD
The purpose of this research to prioritize the factors affecting administrative corruption in government organizations using analytic network process until the arrival of prioritized dimensions to Quality Function Deployment model, provide appropriate strategies for solving this basic organizational problem.This study is a descriptive survey research and located into the category of applied res...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کامل