Network Security and Policy Enforcement System
Nagaveni 1 , Sujata.Terdal 2
- Computer Science Department, PDA College of Engineering-VTU University, Kalaburagi, India.
- Computer Science Department, PDA College of Engineering-VTU University, Kalaburagi, India.
Correspondence should be addressed to: nagaveni.Rasure19@gmail.com.
Section:Review Paper, Product Type: Journal Paper
Volume-5 ,
Issue-5 , Page no. 170-174, May-2017
Online published on May 30, 2017
Copyright © Nagaveni, Sujata.Terdal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Nagaveni, Sujata.Terdal, “Network Security and Policy Enforcement System,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.170-174, 2017.
MLA Citation
MLA Style Citation: Nagaveni, Sujata.Terdal "Network Security and Policy Enforcement System." International Journal of Computer Sciences and Engineering 5.5 (2017): 170-174.
APA Citation
APA Style Citation: Nagaveni, Sujata.Terdal, (2017). Network Security and Policy Enforcement System. International Journal of Computer Sciences and Engineering, 5(5), 170-174.
BibTex Citation
BibTex Style Citation:
@article{_2017,
author = {Nagaveni, Sujata.Terdal},
title = {Network Security and Policy Enforcement System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {170-174},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1285},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1285
TI - Network Security and Policy Enforcement System
T2 - International Journal of Computer Sciences and Engineering
AU - Nagaveni, Sujata.Terdal
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 170-174
IS - 5
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
671 | 331 downloads | 566 downloads |




Abstract
Network operators will rely on the security services to protect the IT infrastructures. It describes design, development and implementations of organizational policies using OCS (Open Computer System) software. These policies are enforced automatically in distributed network environment. We aim to reduce human intervention by developing a practical network reconfiguration system, in that system we simply deploy security policies which are handled by the software. The main component is OCS (open computer system) which consists of different modules of SNMP(simple network management protocol) they are SNMP communities, SNMP groups, SNMP target address and SNMP users etc. Network device automated management tools contains many firewalls in dynamic environment. It is necessary to enable network elements by reconfiguring without any human intervention . The main focus of this project is OCS-NG(open computer system next generation) inventory software that contains all related information’s and it is connected to workstations. Finally, the system collects the information efficiently and store the security management information in the database for off-line analysis required for network based policy enforcement.
Key-Words / Index Term
NetworkManagement, Security, Policyspecification, Managementconsole, VLANconfiguration
References
[1] Eld G., Hundley K., “Cisco Security Architectures”, McGraw-Hill, New York, pp.1-635, 1999 .
[2] S Gkarafli, AA Economides, “Comparing the proof by knowledge Authentication Techniques”, international Journal of Computer Science and Security (IJCSS), Vol.4, Issue.2, pp.37-55, 2011.
[3] R. Morris, K. Thompson, “ Password security: A case history”, Comm. ACM, Vol.22, no. 11, pp. 594-597, 1979.
[4] Harbittr A., Menasce D.A., “ A methodology for Analyzing the Performance of Authentication Protocols”, ACM, Vol 5, no 4, pp.58-91, 2002.
[5] R. Yavatkar, D. Pendarakis, R. Guerin, “ A Framework for policy based admission control”, IETF, USA, pp.1-20, 2000.
[6] A. Bandara, E. Lupu, J. Moffet, A.,Russo, “A goal-based approach to policy refinement”, In Proceedings of 5th IEEE Workshop on policies for Distributed system and networks(Policy 2004), NewYork,USA, pp.23-28, 2004.
[7] R. Wie. “Policies in Network and Systems Management - Formal definition and architecture”. Journal of Systems and Network Management Vol.2, no.1, pp.63-83, 1994.
[8] Alabady S., “ Design and Implimentation of a Network Security Model using Static VLAN and AAA Server,” In proceeding International Conference on Information & Communication Technologies: from Theory to Applications, US, pp.1-9, 2008.
[9] B.L. Riddle, M.S. Miron, J.A. Semo, “Passwords in use in a university timesharing environment”, Computer and Security, Vol. 8, no.7, pp. 569-579, 1989.
[10] Gholamreza Shahmohammadi, “Scenario-based Evaluation of software Architecture styles from the security viewpoint”, international Journal of Computer Science and Engineering (IJCSE), Vol.4, Issue.4, pp.10-20, 2016 .