UTM-CM: A Practical Control Mechanism Solution for UTM System

Ying Zhang, Fachao Deng, Zhen Chen, Y. Xue, Chuang Lin
{"title":"UTM-CM: A Practical Control Mechanism Solution for UTM System","authors":"Ying Zhang, Fachao Deng, Zhen Chen, Y. Xue, Chuang Lin","doi":"10.1109/CMC.2010.267","DOIUrl":null,"url":null,"abstract":"Since emerged in 2004, Unified Threat Management (UTM) has been used widely to enhance network security protection. Typical UTM device integrates multiple security technologies, therefore its control and management involves various interfaces, message formats, communication protocols, and security policies and so on. Therefore, it is a big challenge to design and implement the configuration and management of security technologies in UTM. To address this issue, this paper proposes a practical UTM control mechanism that features ease-to-use, scalability, interoperability, high-efficiency and reliability. The solution, called UTM-Configuration and Management (UTM-CM), has been implemented and its performance was evaluated.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Communications and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMC.2010.267","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

Since emerged in 2004, Unified Threat Management (UTM) has been used widely to enhance network security protection. Typical UTM device integrates multiple security technologies, therefore its control and management involves various interfaces, message formats, communication protocols, and security policies and so on. Therefore, it is a big challenge to design and implement the configuration and management of security technologies in UTM. To address this issue, this paper proposes a practical UTM control mechanism that features ease-to-use, scalability, interoperability, high-efficiency and reliability. The solution, called UTM-Configuration and Management (UTM-CM), has been implemented and its performance was evaluated.
UTM- cm: UTM系统的实用控制机制解决方案
统一威胁管理(Unified Threat Management, UTM)自2004年出现以来,被广泛应用于增强网络安全防护。典型的UTM设备集成了多种安全技术,因此其控制和管理涉及到各种接口、消息格式、通信协议和安全策略等。因此,如何设计和实现UTM中安全技术的配置和管理是一个很大的挑战。为了解决这一问题,本文提出了一种实用的UTM控制机制,该机制具有易于使用、可扩展性、互操作性、高效率和可靠性等特点。该解决方案称为utm配置和管理(UTM-CM),已经实现并对其性能进行了评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信