Abstract:
PURPOSE: A network system for simultaneously providing a network security service and a QoS(Quality of Service) service is provided to enhance the utilization of network security resources by dividing the network security resources into SFEs(Security Function Entities), distributing and installing the SFEs in network nodes, and centralizing and managing the SFEs. CONSTITUTION: One or more network nodes(11) have a security function block(111) having one or more SFEs(111a). The network nodes(11) have QoS resources. A path control server(10) connects to the network nodes(11), and stores and corrects security resource states and QoS resource states of the network nodes(11). The path control server(10) calculates a path suitable for the QoS and security request item of a client by the security resource states and the QoS resource states according to the connection request of the client.
Abstract:
PURPOSE: A method for expressing, storing and editing a network security policy is provided to reduce development cost and time for policy-based network security management system, and to allow a designer to directly design an operation structure of a network security policy management tool, database schema and a structure of an object. CONSTITUTION: SecurityRule is a class for a rule object(200) including attributes of a rule itself. OnePacketCondition is a class for a condition object(310) indicating a condition for analyzing one packet. ConditionListType is an attribute indicating a combination method of each item for analyzing OnePacketCondition. VariableValueComparisonCondition is a class for condition objects(310a,310b) indicating a condition for comparing a field of a packet header with a value. Operator is an attribute indicating an operator to be used for checking. PayloadMatchingCondition is a class for a condition object(310c) for checking which content is included in a payload of a packet. PayloadVariable is a class for a variable object(310j) indicating a payload. AggregatedAlertAction is a class for an operation object(410a) indicating an alarming a rule applied situation. AggregatedAlertAction has an attribute of AlertDescription indicating descriptions for the rule applied situation. MessageStoreAction is a class indicating an operation object(410b) storing an alarm message. MessageShowAction is a class indicating an operation object(410c) outputting the alarm message.
Abstract:
본 발명은 분산된 보안자원을 포함하는 인터넷 서비스 사업자 망의 보안서비스 방법 및 시스템에 관한 것으로서, 그 방법은 분산된 보안 자원을 포함하는 다수 노드로 구성된 인터넷 서비스 사업자 망의 각 노드의 패킷처리 방법에 있어서 보안정보가 마킹된 패킷을 분석하는 패킷분석단계; 패킷의 보안정보에 상응하는 보안기능을 수행하는 보안단계; 및 분산된 보안자원의 주소정보를 이용하여 마킹된 패킷이 이동할 다음 홉을 결정하여 결정된 홉으로 패킷을 전달하는 단계를 포함함을 특징으로 한다. 그리고 그 시스템은 분산된 보안 자원을 포함하는 다수 노드로 구성된 인터넷 서비스 사업자 망의 각 노드의 패킷처리 방법에 있어서 보안정보가 마킹된 패킷인지 여부를 검사하여 마킹패킷이면 마킹정보를 분석하는 패킷분석부; 보안정보에 상응하는 보안기능을 수행하는 보안기능부; 보안기능이 수행된 보안정보에 대해서는 더 이상 동일한 보안기능을 수행하지 않도록 보안정보를 변환하는 마킹변환부; 및 마킹패킷이면 보안자원의 주소정보를 이용하여 패킷이 이동할 다음 홉을 결정하여 결정된 홉으로 패킷을 전달하고, 마킹패킷이 아니면 라우팅 정보에 따라 다음 홉으로 패킷을 전달하는 경로결정부를 포함함을 특징으로 한다. 본 발명에 의하면 마킹패킷을 이용하여 인터넷 서비스 망에 존재하는 분산된 네트워크 보안자원을 효율적으로 활용하여 차별화된 보안서비스를 제공할 수 있다.
Abstract:
본 발명은 인터넷 서비스 제공자(Internet Service Provider, ISP)망의 모든 자원을 최대한 활용하여 고객이 요구하는 네트워크 보안 서비스와 QoS 서비스(Quality of Service)를 동시에 제공하기 위하여 고객의 연결 요구가 들어왔을 때 그 연결 요구를 수용하여 연결을 설정하는 방법에 관한 것이다. 본 발명의 연결 설정 방법은 QoS 요구사항과 보안 서비스 요구사항이 명시된 고객의 연결 요구를 입력받는 단계; 상기 QoS 요구사항을 만족시키는 최단 라우팅 경로를 모두 검색하여 찾아내는 단계; 상기 검색하여 찾아낸 한 개 이상의 라우팅 경로에 속하는 라우터들의 보안 서비스 자원을 검색하는 단계; 상기 검색된 경로중 상기 보안 서비스 요구사항을 만족시키는 라우팅 경로가 존재하는가 판단하는 단계; 상기 판단 결과 라우팅 경로가 존재하면 그 경로를 설정하고 QoS 자원과 보안 서비스 자원을 예약하는 단계; 및 상기 라우터의 보안 기능 엔터티의 상태 정보인 보안자원정보베이스와 상기 라우터의 QoS 자원 상태 정보인 QoS자원정보베이스를 수정하는 단계를 포함한다. 본 발명은 서비스 제공자 망에 분산되어 있는 네트워크 보안용 자원과 QoS용 자원을 효율적으로 활용할 수 있는 효과가 있다.
Abstract:
A network security policy is represented, stored and edited by using a rule object, a condition object, an action object, and their associations. The condition object is a one-packet-condition object, a repeated-packet-condition object or a linear-packet-condition object. The action object is an alert-action object, a packet-drop-action object, a packet-admission-action object, a session-drop-action object, a session-admission-action object, a session-logging-action object, a traceback-action object or an ICMP-unreachable-message-sending-action object.
Abstract:
PURPOSE: A method for storing a tree structure policy of a user view by using a reuseable container is provided to store repeated objects only once by using the reuseable container though the user does not know the concept of a reuse container constructed by reuseable objects previously designated when inserting, canceling and correcting policies by a user. CONSTITUTION: In a process(S100), reuse trees capable of sharing are previously designated and managed in a reuseable container separately. Rules and policies constructed by a rooted tree structure without node shared at the user's view are changed into a directed acyclic graph structure by using the reuseable container and then stored it(S200). According to a tree inserting request, a tree cancellation request and an object correction request of the user's view, a tree is inserted to the directed acyclic graph structure or cancelled by using the reuseable container and a specific objected is corrected(S300,S400,S500).
Abstract:
PURPOSE: A method for providing extranet VPN(Virtual Private Network) service in an MPLS(Multi Protocol Label Switching) network is provided to offer intranet VPN service and extranet VPN service at the same time, without having an effect on an old service providing mechanism, by utilizing a route target and a VPN label variable used in existing MPLS VPN intranet service. CONSTITUTION: A VPN packet processing procedure at an MPLS terminal side is divided into egress forwarding, extra-gate forwarding, and relay forwarding. In order to effectively classify it, a VPN label is composed of a 2-bit label type classifier(401) and 18-bit label index information(402). The 2-bit label type classifier(401) indicates a forwarding method, and the 18-bit label index information(402) indicates an output IF or an index for a table for access filtering. If a VPN packet is received, an extranet gateway and egress LER checks the VPN label value carried with the received packet and recognizes which procedure to be executed.
Abstract:
PURPOSE: A method for offering and executing a policy using a system function on a policy based network security management system is provided to increase expandability and flexibility of a policy server by generating a network security policy as referring the system function of a client, and offering it to the related policy client. CONSTITUTION: The system function having a different value for maintaining and managing each policy client is recognized mutually between the policy server and the policy client. The policy server generates, edits, or stores the network security policy referring the system function(S20). The policy server transfers the network security policy to the policy client(S30). The policy client replaces the system function with an actual value returned from the system function of the network security policy(S40). The policy client executes the network security policy(S50).
Abstract:
PURPOSE: A method for checking a collision at editing a policy in a network security policy managing tool is provided to complement an operation mechanism of a network security policy managing tool based on a policy server. CONSTITUTION: It is judged whether an appendix is executed or new object is created with respect to a reusable object(S41). If new object is created, a corresponding object is selected(S42) and an attribute of the selected object is inputted(S43). If a rule object is created, an attribute of the rule object is inputted. In addition, it is checked whether a rule object having an identical name or keyword exists(S44). In the case that a condition object, an action object, a variable object, or a value object is created except a rule object, it is checked whether an object of the same name exists. In addition, when an attribute is inputted, it is checked whether a value possessed in a range defined by the attribute is inputted, and the corresponding object is created(S45-S46). It is judged whether an object to be appended exists after creating the object(S47). If an object to be appended exists, the stage is returned to the stage (S41).
Abstract:
PURPOSE: A method for checking a collision at editing a policy in a network security policy managing tool is provided to complement an operation mechanism of a network security policy managing tool based on a policy server. CONSTITUTION: It is judged whether an appendix is executed or new object is created with respect to a reusable object(S41). If new object is created, a corresponding object is selected(S42) and an attribute of the selected object is inputted(S43). If a rule object is created, an attribute of the rule object is inputted. In addition, it is checked whether a rule object having an identical name or keyword exists(S44). In the case that a condition object, an action object, a variable object, or a value object is created except a rule object, it is checked whether an object of the same name exists. In addition, when an attribute is inputted, it is checked whether a value possessed in a range defined by the attribute is inputted, and the corresponding object is created(S45-S46). It is judged whether an object to be appended exists after creating the object(S47). If an object to be appended exists, the stage is returned to the stage (S41).