ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Policy Space Analysis Based on Security

Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 261-269

Keywords : IJMTST; ISSN:2455-3778;

Source : Downloadexternal Find it from : Google Scholarexternal


Network operators relay on security services to protect their IT infrastructures. Different kinds of network security policies are defined globally and distributed among multiple parties with security middle boxes deployed in networks. Due to the complexity of security policy network employs existing path wise approaches. This paper models the enforcement of security policy as covering problem and designing tools as computational Geometry Based Policy Space Analysis (PSA) for set operations of security policy. This heuristic information reveals intrinsic complexities of Security Policy and guides the design of our enforcement approach. Then the proposed system selects modes of number of enforcement network nodes deploy multiple policy subsets in a greedy manner. This approach can be employed on network topologies both data center and service provider. As a result, the proposed system provides security efficiently by using Policy Space Analysis(PSA).

Last modified: 2017-08-02 00:45:30