网络安全策略模型及冲突检测研究
[Abstract]:Policy-based network management has been widely used in the field of network security management because of its flexibility, ease of use and automation. A policy is a set of constraint rules configured by a network administrator to secure the system. It is found that the network topology structure is often neglected in the current network security policy model. However, network topology is an important consideration in policy-based network management. The change of network topology will change the network management strategy. At the same time, as the network structure becomes more and more complex, the configuration of the policy inevitably conflicts. Therefore, almost all policy-based network security models need to check the policy consistency to eliminate the conflicts in the policy system, otherwise, there will be security vulnerabilities in the system. The current policy conflict detection methods are divided into two categories: single point detection and global detection. If single point detection is carried out, only the policy conflict within the network equipment can be detected, but the policy conflict between the network devices can not be detected. Global detection is a set of rules for all devices, which may cause conflict false positives. Because in large networks, policy inconsistency between different paths is perfectly reasonable. Aiming at the problem of neglecting the network topology in the current network security policy model, this paper proposes a network security policy model based on network topology, that is, the unified modeling of network topology and policy rules in network devices. In the model, the network topology is abstracted as an undirected graph, and the data communication path between network devices is abstracted as a path between two nodes in an undirected graph. At the same time, the port and policy rules are formalized to realize the organic relation between policy and undirected graph. Aiming at the problems of single point detection or global detection in current network security policy conflict detection, a path-based policy conflict detection method is proposed in this paper, that is, the conflict detection strategy is the path rule set in the network path. By this method, the possible conflicts in network device configuration can be detected accurately. At the same time, in order to improve the efficiency of policy conflict detection, this paper proposes a policy conflict detection algorithm based on decision tree. The algorithm classifies the rules according to the dimension of the rules, constructs a decision tree, and then detects the conflict of the rules contained in the leaf nodes in the decision tree. By classifying the rules into the same leaf node by the decision tree, the conflict detection efficiency can be improved by reducing the number of rules compared with each other. Finally, based on the above model and algorithm, the prototype system of network security policy conflict detection is designed. Through the test case verification the system can accurately detect the policy conflict in the network and the classification algorithm based on decision tree can significantly improve the efficiency of policy conflict detection.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【参考文献】
相关期刊论文 前10条
1 李涛;林九川;胡爱群;;基于本体模型的网络系统安全参数采集过程[J];网络与信息安全学报;2017年02期
2 周健;沈震群;;移动网络安全策略冲突检测方法的改进研究[J];现代电子技术;2017年03期
3 谢妞妞;;决策树算法综述[J];软件导刊;2015年11期
4 唐成华;王丽娜;强保华;汤申生;张鑫;;基于语义相似度的静态安全策略一致性检测[J];计算机科学;2015年08期
5 李瑞;许旭睿;;决策树ID3算法的分析与优化[J];大连交通大学学报;2015年02期
6 刘江;张红旗;代向东;王义功;;一种ABAC静态策略冲突检测算法[J];计算机工程;2013年06期
7 莫禾胜;杨端;;路由器访问控制列表技术应用研究[J];科技视界;2013年09期
8 张成;王学梅;丘东元;张波;;基于有限状态自动机的电镀电源多波形输出方法[J];电源学报;2012年06期
9 唐子蛟;李红蝉;;基于ACL的网络安全管理的应用研究[J];四川理工学院学报(自然科学版);2009年01期
10 李钢;吴燎原;张仁斌;张佑生;;基于有限自动机的模式匹配算法及其应用研究[J];系统仿真学报;2007年12期
相关博士学位论文 前1条
1 于海波;基于规则和本体的应用安全策略研究[D];吉林大学;2006年
相关硕士学位论文 前10条
1 陶昱;基于有限状态自动机的动态信息流监控研究与分析[D];江苏大学;2010年
2 陆雄;基于对象的综合安全策略配置技术的研究与实现[D];国防科学技术大学;2010年
3 朱耀强;网格安全策略冲突检测及其消解机制的研究[D];长春工业大学;2010年
4 邱密;基于贝叶斯理论的网络流量分类研究[D];湖南工业大学;2009年
5 代向东;安全策略管理系统中策略描述及策略翻译关键技术研究[D];解放军信息工程大学;2007年
6 陶欣予;基于PDL的策略管理系统研究[D];吉林大学;2006年
7 魏雁平;基于有向图覆盖关系的安全策略冲突检测模型[D];四川大学;2006年
8 梅芳;PBNM系统中策略冲突检测与消解机制的研究[D];吉林大学;2005年
9 吴蓓;自适应策略管理框架及关键技术研究[D];中国人民解放军信息工程大学;2005年
10 刘鹏;分布式安全策略部署模型的研究[D];西北工业大学;2005年
,本文编号:2187125
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2187125.html