Automated Policy Compliance and Change Detection Managed Service in Data Networks
نویسنده
چکیده
As networks continue to grow in size, speed and complexity, as well as in the diversification of their services, they require many ad-hoc configuration changes. Such changes may lead to potential configuration errors, policy violations, inefficiencies, and vulnerable states. The current Network Management landscape is in a dire need for an automated process to prioritize and manage risk, audit configurations against internal policies or external best practices, and provide centralize reporting for monitoring and regulatory purposes in real time. This paper defines a framework for automated configuration process with a policy compliance and change detection system, which performs automatic and intelligent network configuration audits by using pre-defined configuration templates and library of rules that encompass industry standards for various routing and security related guidelines.System administrators and change initiators will have a real time feedback if any of their configuration changes violate any of the policies set for any given device.
منابع مشابه
Perceived Barriers to Utilizing Maternal and Neonatal Health Services in Contracted-Out Versus Government-Managed Health Facilities in the Rural Districts of Pakistan
Background A number of developing countries have contracted out public health facilities to the Non-Government Organizations (NGOs) in order to improve service utilization. However, there is a paucity of in-depth qualitative information on barriers to access services as a result of contracting from service users’ perspective. The objective of this study was to explore perceived barriers to util...
متن کاملA Model for Implementing & Continuously Improving the Automated Change Management Process for Construction Mega Projects
In the construction industry, project changes constitute a major cause of delay, disruption, cost increases, poor quality and unsatisfying performance. They are also known as a main factor of litigation between the owners and constructors. Construction projects are essentially process-based, and with the critical role of Information Technology (IT) in this industry, projects, especially mega pr...
متن کاملSurvey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery
this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...
متن کاملAutomating Compliance for Cloud Computing Services
We present an integrated approach for automating service providers’ compliance with data protection laws and regulations, business and technical requirements in cloud computing. The techniques we propose in particular include: natural-language analysis (of legislative and regulatory texts, and corporate security rulebooks) and extraction of enforceable rules, use of sticky policies, automated p...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کامل