scholarly journals COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

2014 ◽  
Vol 4 (4) ◽  
pp. 787-790
Author(s):  
Nisha Mariam Varughese ◽  
2020 ◽  
Vol 20 ◽  
pp. 95-108
Author(s):  
Zhiyong Shan ◽  
Vinod Namboodiri

In recent years, the emerged network worms and attacks have distributive characteristics, which can spread globally in a short time. Security management crossing network to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. This paper proposes a hierarchical distributed network security management system (HD-NSMS), which can centrally manage security across networks. First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; at last, it describes the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).


CONVERTER ◽  
2021 ◽  
pp. 590-597
Author(s):  
Zhao Yonggang

In the process of using the computer network, the main page is hacked, the virus overflows, the information is stolen and so on, which brings the inestimable loss to the security of the campus network. Therefore, how to improve the security of campus computer network has become a common concern. This paper discusses the importance of network security in Colleges and universities, and points out the factors that threaten the network security in Colleges and universities. Based on the analysis of the security problems existing in the computer network system and the current situation of network security management in Colleges and universities, this paper puts forward some measures to strengthen the computer network security management in Colleges and universities. This paper studies and designs a set of computer intranet terminal security management system which is suitable for the characteristics of colleges and universities, including domain management subsystem, patch management subsystem, access control subsystem and platform monitoring subsystem. This paper makes a comprehensive analysis of the functions of each subsystem, and introduces the corresponding management processes and strategies. This paper describes the relationship between the subsystems and analyzes the interface between the architecture and other application systems.


2014 ◽  
Vol 687-691 ◽  
pp. 2435-2437
Author(s):  
Hui Yang Chen

This paper introduces a middleware ICE and network security management technology, and points out that the ICE in the distributed network security management system advantage. And then it puts forward a multilevel network security management system using ICE middleware technology, multilevel security management system establishment of wide area network, a vertically integrated, unified, which can carry out security event monitoring, centralized acquisition and processing, security policy management, security alarm and alarm disposal and attendance management.


Sign in / Sign up

Export Citation Format

Share Document