UTM-CM: A Practical Control Mechanism Solution for UTM System

Since emerged in 2004, Unified Threat Management (UTM) has been used widely to enhance network security protection. Typical UTM device integrates multiple security technologies, therefore its control and management involves various interfaces, message formats, communication protocols, and security policies and so on. Therefore, it is a big challenge to design and implement the configuration and management of security technologies in UTM. To address this issue, this paper proposes a practical UTM control mechanism that features ease-to-use, scalability, interoperability, high-efficiency and reliability. The solution, called UTM-Configuration and Management (UTM-CM), has been implemented and its performance was evaluated.

[1]  Wei Zheng,et al.  Automatic configuration of internet services , 2007, EuroSys '07.

[2]  Joseph L. Hellerstein,et al.  Towards an Understanding of Decision Complexity in IT Configuration , 2006, 2006 IEEE International Conference on Autonomic Computing.

[3]  Seungjoon Lee,et al.  Adaptive parsing of router configuration languages , 2008, 2008 IEEE Internet Network Management Workshop (INM).

[4]  Bin Zhang,et al.  Challenges to the New Network Management Protocol: NETCONF , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[5]  P. Drake Using SNMP to manage networks , 1991 .

[6]  Lisandro Zambenedetti Granville,et al.  Evaluating the Performance of SNMP and Web Services Notifications , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[7]  J. Garrido,et al.  A generic software platform for controlling collaborative robotic system using XML-RPC , 2005, Proceedings, 2005 IEEE/ASME International Conference on Advanced Intelligent Mechatronics..

[8]  Weifeng Shan,et al.  Design of the Next Generation Military Network Management System Based on NETCONF , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[9]  Debao Xiao,et al.  Design and Implementation of NETCONF-Based Network Management System , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[10]  M.A. Iqbal,et al.  An efficient configuration unit design for VLIW based reconfigurable processors , 2008, 2008 IEEE International Multitopic Conference.

[11]  Ye Wang,et al.  Shadow configuration as a network management primitive , 2008, SIGCOMM '08.