Realization of Key Technology of Trusted Network Connect Based on IF-MAP Protocol
- DOI
- 10.2991/iset-15.2015.38How to use a DOI?
- Keywords
- Trusted computing, Trusted network connect, Network access control, Metadata access point, Network security
- Abstract
Network security has attracted increasing research interest in recent years. Through detailed investigations of the related structure of Trusted Network Connect (TNC), in this paper we research into the norms and key technology of Interface for Metadata Access Point (IF-MAP) protocol, as well as design and realize a prototype system of TNC based on the very protocol. The system includes trusted access module for endpoint computer and a security component that applies IF-MAP protocol. It realizes the sharing and interaction of security event information between firewall and Intrusion Detection System (IDS) and provides the capabilities of behavior determination for the endpoint computers and dynamic policy modification for firewalls.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Zelong Wang AU - Guoyang Cai AU - Wanzhen Liu PY - 2015/03 DA - 2015/03 TI - Realization of Key Technology of Trusted Network Connect Based on IF-MAP Protocol BT - Proceedings of the First International Conference on Information Science and Electronic Technology PB - Atlantis Press SP - 150 EP - 154 SN - 2352-538X UR - https://doi.org/10.2991/iset-15.2015.38 DO - 10.2991/iset-15.2015.38 ID - Wang2015/03 ER -