• Title/Summary/Keyword: Network policy

Search Result 2,615, Processing Time 0.027 seconds

Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems (정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구)

  • Lee, Kyu-Woong
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.

ADesign and Implementation of Policy-based Network Management System for Internet QoS Support Mobile IP Networks (인터넷 QoS 지원 이동 IP 망에서의 정책기반 망 관리 시스템 설계 및 구현)

  • 김태경;강승완;유상조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.192-202
    • /
    • 2004
  • In this paper we have proposed policy-based network management system architecture for Internet QoS support Mobile IP networks that is divided into four layers(application layer, information management layer, policy control layer, device layer), then we propose an implementation strategy of policy-based network management system to enforce various control and network management operations and a model of policy server using SCOPS(Simple Common Open Policy Service) protocol that is developed in this research. For policy-based mobile IP network management system implementation, we have derived four policy classes(access control, mobile IP operation, QoS control, and network monitoring) and we showed operation procedures for each policy scenarios. Finally we have implemented Internet QoS support policy-based mobile IP network testbed and management system and verified out DiffServ policy enforcement behaviors for a target class service that is arranged a specific bandwidth on network congestion conditions.

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

Modeling and Simulation of Policy-based Network Security

  • Lee, Won-young;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.155-162
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. In this paper we build a foundation of policy-based network modeling and simulation environment. The procedure and structure for the induction of policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are developed. The structure also transforms the policy rules into PCIM (Policy Core Information Model). The effect on a particular policy can be tested and analyzed through the simulation with the PCIMs and SVDB.

  • PDF

An Analysis on the Nurse Expansion Policies through Policy Network (정책네트워크 이론을 이용한 간호사 확보를 위한 정책과정 분석)

  • Ko, Yu-Kyung;Park, Bo-hyun
    • Health Policy and Management
    • /
    • v.25 no.2
    • /
    • pp.129-139
    • /
    • 2015
  • Background: Policy network theory was proved to be an appropriate analytic tool for the current social welfare policy making process. This study aimed to analyze policy making process related to the nurse expansion and policy output while focusing on the interactions and activities among various policy actors. Methods: In this study, we used reports related to the need for expansion of nursing personnel journals, dissertations, newspaper articles, for hearings and debate policies for securing nurse data, and interviews. We examined three components of policy network, that is, policy actors, interactions, linkage of interest. Results: For that to expand the nurse before the 2000s in expanding the supply of medical supplies have been conducted without much disagreement among policy actors under the government's initiative. However, there was lacked a close relationship between the expanding supply of nurses and inaccurate analysis of supply and demand. As the policy is applied between the various policy actors' needs and claims, conflict was intensified and many policy options had been developed. Government only took a role as a coordinator among policy actors in the 2000's. Also, it was difficult to find sufficient and clear evidence that policy-making process based on fair judgment. Conclusion: Therefore, it is urgently required to determine the policy through a social consensus to address the appropriate policy means and the process by correct analysis of the policy issues.

S&T Policy Trend Using Language Network Analysis: Focusing on Science and Technology Basic Plan

  • Kim, Yun Jong;Jeong, Dae-hyun;Oh, Hyunchul
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.2
    • /
    • pp.111-137
    • /
    • 2017
  • This study analyzes a language network of Science and Technology Basic Plan, which is the basis for science and technology policy in Korea, for the next Science and Technology Basic Plan. Language network analysis was adopted for a quantitative approach measuring the trend of policies. Several techniques such as keyword analysis, language network map analysis, quantitative characteristics analysis and keyword-related major-word analysis have been performed. Results show that there are common policies emphasized by all Science and Technology Basic Plans in the past, and there are also specific policies emphasized in each period of the Science and Technology Basic Plan. These specific policies come from a 'change of times' when the Science and Technology Basic Plans were established, as well as the philosophy of the national government.

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF

A study on the Application of Policy-Based Networking for QoS in The Defense Information System (국방정보체계의 서비스 품질(QoS) 보장을 위한 정책기반(Policy-Based)네트워킹 적용에 관한 연구)

  • 김광영;이승종
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.1
    • /
    • pp.57-75
    • /
    • 2003
  • Policy-based networking offers a network manager the ability to manage the network in a holistic and dynamic fashion rather than force a network manager to manage the network by dealing with each device individually. Policy-based networking is focusing on users and applications instead of emphasizing devices and interfaces. An important part of the policy-based networking is to simplify the task of administration and management for different disciplines. The Defense Information System(DIS) of today are complex and heterogeneous systems. Operational needs are not a trivial task and Quality of Service(QoS) is not generally guaranteed. So, important data may be missed or congested by trivial data. Policy-based networking provide a way to support QoS and simplify the management of multiple devices deploying complex technologies. This paper suggest implementation of policy-based networking in DIS to improvement of performance, and implementation is progressed step by step. Especially this paper is focusing on the providing QoS with policy-based networking using Lightweight Directory Access Protocol(LDAP) Server.

Analysis on the Type of S&T Knowledge Expert Network : A Case Study of the Global Network of Korean Scientists & Engineers (과학기술 지식전문가 정책 네트워크 유형분석 : 한민족과학기술자 네트워크(KOSEN)를 중심으로)

  • Jeong, Yion-Il;Lee, Joo-Young;Yoon, Jung-Sun
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.199-215
    • /
    • 2005
  • Experts participating in the knowledge expert network externalize their implicit knowledge by providing information or writing reports. Almost all the members of the network share externalized knowledge and the network facilitate the dissemination and diffusion of knowledge. Individuals reproduce another implicit knowledge by internalizing shared knowledge through the network and re-created knowledge is externalized, establishing knowledge circulation. In this paper, we analyze the expert groups of the Global Network of Korean Scientists & Engineers(KOSEN, www.kosen21.org), the Korea's No. 1 science and engineering knowledge expert community, with the application of the theory of policy network proposed by Marsh & Rhodes. According to the principal standards of policy network classification such as the number of participants, interaction among participants, consistency, distribution of resources and dependency, we categorize the KOSEN expert groups as closed policy network and opened issue network, and divide closed policy network into core community and periphery community.

A Framework and Policy Scenarios of Policy-based Mobile IP Networks (정책기반 이동 IP 네트워크의 프레임워크와 정책 시나리오)

  • 강승완;김태경;이정환;유상조
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.105-108
    • /
    • 2003
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. The network management for maintaining stable and efficient environment is more difficult according to being various by complicated network environment and requirements of provided service and user. The recent rises concern about policy-based network technology. Therefore, this paper proposed a framework of policy-based network and developed policy scenarios using the presented policy language of mobile IP.

  • PDF