Design and Implementation of Trusted Campus Network Operation Architecture

QIN Hua,ZHANG Shu-jie
DOI: https://doi.org/10.3969/j.issn.1000-3428.2008.08.096
2008-01-01
Abstract:This paper provides a mechanism which depends on the ability of networking devices to analyze,detect,assess and response anomaly events in network operation.By collecting network traffic and classifying according to their behavior,a method is employed to mining the anomaly traffic behavior.The threat level to the network availability is computed by Bayesian model and the corresponding policies are generated to control this anomaly traffic automatically based on the result of threat evaluation.These policies are device-independent,and will be transformed to devices-dependent policy configuration commands by using XML techniques before they are deployed to a particular device.The mechanism given in this paper has capability to control network continuously and provides support to different networking equipments from different vendors.
What problem does this paper attempt to address?