首页 > 最新文献

Fourth IEEE International Workshop on Information Assurance (IWIA'06)最新文献

英文 中文
An intelligent detection and response strategy to false positives and network attacks 对误报和网络攻击的智能检测和响应策略
Pub Date : 2006-05-23 DOI: 10.1007/11760146_101
E. Hooper
{"title":"An intelligent detection and response strategy to false positives and network attacks","authors":"E. Hooper","doi":"10.1007/11760146_101","DOIUrl":"https://doi.org/10.1007/11760146_101","url":null,"abstract":"","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126346933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Jamming commercial satellite communications during wartime an empirical study 战时干扰商业卫星通信的实证研究
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.15
H. Rausch
Satellite communications parameters - carrier to noise ratio, bandwidth, power, and frequency - were recorded for approximately 500 satellite communication carriers continuously, over a period of 16 months. These carriers support communications for military operations in the current Iraq war. Communications outages during this period were logged and the reason for outage was determined. Some outages caused by electromagnetic interference are shown to have characteristics that would be expected if these carriers were being subjected to a hostile denial of service attack
在16个月的时间里,连续记录了大约500个卫星通信载波的卫星通信参数——载波噪声比、带宽、功率和频率。这些航母为当前伊拉克战争中的军事行动提供通信支持。记录了此期间的通信中断,并确定了中断的原因。一些由电磁干扰引起的中断显示出,如果这些运营商受到恶意拒绝服务攻击,将具有预期的特征
{"title":"Jamming commercial satellite communications during wartime an empirical study","authors":"H. Rausch","doi":"10.1109/IWIA.2006.15","DOIUrl":"https://doi.org/10.1109/IWIA.2006.15","url":null,"abstract":"Satellite communications parameters - carrier to noise ratio, bandwidth, power, and frequency - were recorded for approximately 500 satellite communication carriers continuously, over a period of 16 months. These carriers support communications for military operations in the current Iraq war. Communications outages during this period were logged and the reason for outage was determined. Some outages caused by electromagnetic interference are shown to have characteristics that would be expected if these carriers were being subjected to a hostile denial of service attack","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An application of information theory to intrusion detection 信息论在入侵检测中的应用
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.3
E. Eiland, L. Liebrock
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having identified "degree of system knowledge" as one difference between legitimate and illegitimate users, theorists have drawn on information theory as a basis for intrusion detection. In particular, Kolmogorov complexity (K) has been used successfully. In this work, we consider information distance (Observed_K - Expected_K) as a method of detecting system scans. Observed_K is computed directly, Expected_K is taken from compression tests shared herein. Results are encouraging. Observed scan traffic has an information distance at least an order of magnitude greater than the threshold value we determined for normal Internet traffic. With 320 KB packet blocks, separation between distributions appears to exceed 4sigma
零日攻击是一种利用以前未知的系统漏洞的新(异常)攻击,是一种严重的威胁。然而,抵御它们并非易事。在将“系统知识程度”确定为合法用户和非法用户之间的区别之后,理论家们将信息论作为入侵检测的基础。特别是成功地使用了Kolmogorov复杂度(K)。在这项工作中,我们考虑信息距离(Observed_K - Expected_K)作为检测系统扫描的方法。Observed_K是直接计算的,Expected_K是从这里共享的压缩测试中获取的。结果令人鼓舞。观察到的扫描流量的信息距离至少比我们为正常互联网流量确定的阈值大一个数量级。对于320 KB的数据包块,分布之间的间隔似乎超过了4sigma
{"title":"An application of information theory to intrusion detection","authors":"E. Eiland, L. Liebrock","doi":"10.1109/IWIA.2006.3","DOIUrl":"https://doi.org/10.1109/IWIA.2006.3","url":null,"abstract":"Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having identified \"degree of system knowledge\" as one difference between legitimate and illegitimate users, theorists have drawn on information theory as a basis for intrusion detection. In particular, Kolmogorov complexity (K) has been used successfully. In this work, we consider information distance (Observed_K - Expected_K) as a method of detecting system scans. Observed_K is computed directly, Expected_K is taken from compression tests shared herein. Results are encouraging. Observed scan traffic has an information distance at least an order of magnitude greater than the threshold value we determined for normal Internet traffic. With 320 KB packet blocks, separation between distributions appears to exceed 4sigma","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Present and future challenges concerning DoS-attacks against PSAPs in VoIP networks VoIP网络中针对psap的dos攻击的现状和未来挑战
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.19
N. Aschenbruck, M. Frank, P. Martini, J. Tölle, Roland Legat, Heinz-Dieter Richmann
Nowadays, voice over IP (VoIP) telephony networks are connected to classic public switched telephony networks (PSTNs). Emergency calls from VoIP peers to PSTN public service answering points (PSAPs) are possible. Through the connection of IP networks and PSTNs the PSAP may be a victim of new, more powerful denial of service (DoS) attacks. This paper describes the present and future architecture of a PSAP. Based on measurements at a PSAP the challenge of attack detection at the PSAP is revealed. Furthermore, first solutions are pointed out and evaluated
目前,IP语音(VoIP)电话网络连接到经典的公共交换电话网络(pstn)。可以从VoIP对等点向PSTN公共服务应答点(psap)进行紧急呼叫。通过IP网络和pstn的连接,PSAP可能成为新的、更强大的拒绝服务(DoS)攻击的受害者。本文描述了PSAP目前和未来的体系结构。通过对PSAP的测量,揭示了PSAP攻击检测面临的挑战。进一步指出了第一解并对其进行了评价
{"title":"Present and future challenges concerning DoS-attacks against PSAPs in VoIP networks","authors":"N. Aschenbruck, M. Frank, P. Martini, J. Tölle, Roland Legat, Heinz-Dieter Richmann","doi":"10.1109/IWIA.2006.19","DOIUrl":"https://doi.org/10.1109/IWIA.2006.19","url":null,"abstract":"Nowadays, voice over IP (VoIP) telephony networks are connected to classic public switched telephony networks (PSTNs). Emergency calls from VoIP peers to PSTN public service answering points (PSAPs) are possible. Through the connection of IP networks and PSTNs the PSAP may be a victim of new, more powerful denial of service (DoS) attacks. This paper describes the present and future architecture of a PSAP. Based on measurements at a PSAP the challenge of attack detection at the PSAP is revealed. Furthermore, first solutions are pointed out and evaluated","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121992184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The LAIDS/LIDS framework for systematic IPS design 系统IPS设计的LAIDS/LIDS框架
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.21
S. Chung, A. Mok
The recent outbreaks of extremely fast spreading worms highlight the inadequacy of the current patching approach. Intrusion prevention systems (IPSs) that automatically generate and apply protection to client systems have been proposed as a solution. Despite all the effort in this area, the design of IPSs remains a difficult, ad hoc process. In this paper, we propose the LAIDS/LIDS framework for systematic design of IPS. A major advantage of our framework is that IPSs designed in this framework have a very simple countermeasure-generation process. To better illustrate our idea, we have implemented a prototype IPS, the Lazy Shepherding IPS, based on our framework. Evaluation shows that the prototype is effective against all tested attacks, and incurs an overhead of less than 3% when it is configured to defend against a large number of attacks. Our prototype also avoids a lot of practical problems faced by many other IPSs
最近爆发的传播速度极快的蠕虫突出了目前修补方法的不足。入侵防御系统(Intrusion prevention system, ips)是一种自动生成保护并应用于客户端系统的入侵防御系统。尽管在这方面作出了所有努力,但ips的设计仍然是一个困难的、临时的过程。本文提出了用于IPS系统设计的LAIDS/LIDS框架。我们的框架的一个主要优点是,在这个框架中设计的ips有一个非常简单的对策生成过程。为了更好地说明我们的想法,我们基于我们的框架实现了一个原型IPS,即Lazy Shepherding IPS。评估表明,该原型对所有测试的攻击都是有效的,当配置为防御大量攻击时,其开销小于3%。我们的原型也避免了许多其他ips所面临的许多实际问题
{"title":"The LAIDS/LIDS framework for systematic IPS design","authors":"S. Chung, A. Mok","doi":"10.1109/IWIA.2006.21","DOIUrl":"https://doi.org/10.1109/IWIA.2006.21","url":null,"abstract":"The recent outbreaks of extremely fast spreading worms highlight the inadequacy of the current patching approach. Intrusion prevention systems (IPSs) that automatically generate and apply protection to client systems have been proposed as a solution. Despite all the effort in this area, the design of IPSs remains a difficult, ad hoc process. In this paper, we propose the LAIDS/LIDS framework for systematic design of IPS. A major advantage of our framework is that IPSs designed in this framework have a very simple countermeasure-generation process. To better illustrate our idea, we have implemented a prototype IPS, the Lazy Shepherding IPS, based on our framework. Evaluation shows that the prototype is effective against all tested attacks, and incurs an overhead of less than 3% when it is configured to defend against a large number of attacks. Our prototype also avoids a lot of practical problems faced by many other IPSs","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HonIDS: enhancing honeypot system with intrusion detection models 利用入侵检测模型增强蜜罐系统
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.14
Yong Tang, Huaping Hu, Xicheng Lu, Jie Wang
Honeypots are highly valued for their detective function. However, suitable detection models use in honeypot system have not been fully explored. We present HonIDS, a honeypot system for detecting malicious hosts and intruders in local network. HonIDS is characterized by its layered structure and is enhanced by two detection models: TFRPP (times, frequency, range, port risk, average payload length) model and Bayes model. The basic idea of these models is that although it is hard to directly judge whether one interaction with the honeypots is an attack or malicious activity, it is possible to identify intruders by analyzing the plentiful and global events of honeypots in a given period of time. The TFRPP model gives the honeypot system the ability to assess different risks, by assigning dubiety scores to the hosts who visited honeypots. The Bayes detection model can detect some main types of attacks by classification. The results of our evaluation experiments indicate that TFRPP model and Bayes model are effective and suitable for honeypot system
蜜罐因其侦查功能而备受重视。然而,适合蜜罐系统的检测模型还没有得到充分的探索。我们提出了一个用于检测本地网络中恶意主机和入侵者的蜜罐系统HonIDS。HonIDS具有分层结构的特点,并通过TFRPP(次数、频率、距离、港口风险、平均有效载荷长度)模型和Bayes模型两种检测模型进行增强。这些模型的基本思想是,尽管很难直接判断与蜜罐的交互是攻击还是恶意活动,但通过分析给定时间段内蜜罐的大量全局事件来识别入侵者是可能的。TFRPP模型赋予蜜罐系统评估不同风险的能力,通过给访问蜜罐的宿主分配可信度分数。贝叶斯检测模型可以通过分类检测出几种主要的攻击类型。我们的评价实验结果表明,TFRPP模型和贝叶斯模型是有效的,适用于蜜罐系统
{"title":"HonIDS: enhancing honeypot system with intrusion detection models","authors":"Yong Tang, Huaping Hu, Xicheng Lu, Jie Wang","doi":"10.1109/IWIA.2006.14","DOIUrl":"https://doi.org/10.1109/IWIA.2006.14","url":null,"abstract":"Honeypots are highly valued for their detective function. However, suitable detection models use in honeypot system have not been fully explored. We present HonIDS, a honeypot system for detecting malicious hosts and intruders in local network. HonIDS is characterized by its layered structure and is enhanced by two detection models: TFRPP (times, frequency, range, port risk, average payload length) model and Bayes model. The basic idea of these models is that although it is hard to directly judge whether one interaction with the honeypots is an attack or malicious activity, it is possible to identify intruders by analyzing the plentiful and global events of honeypots in a given period of time. The TFRPP model gives the honeypot system the ability to assess different risks, by assigning dubiety scores to the hosts who visited honeypots. The Bayes detection model can detect some main types of attacks by classification. The results of our evaluation experiments indicate that TFRPP model and Bayes model are effective and suitable for honeypot system","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Factoring high level information flow specifications into low level access controls 将高级信息流规范分解为低级访问控制
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.8
Kevin Kahley, M. Radhakrishnan, Jon A. Solworth
Low level access controls must provide efficient mechanisms for allowing or denying operations and hence are typically based on the access matrix. However, when combining the goals of efficiency along with the support for least privilege and higher level authorization properties (such as information flow confidentiality), the resulting access controls become tedious to encode. Compositional high level specifications can be much more succinct. When combined with administrative controls, they can be robust in changing what is authorized in a controlled manner. Such specifications offer the promise of being easier to configure and understand, and in fact can be automatically analyzed for authorization properties. However, there remains the issue of how to generate the low level access control configuration from the high level specification. In this paper, we describe a factoring algorithm to algorithmically translate a high level specification of information flow authorization properties into low level access controls. In addition, several optimizations are given which dramatically reduce the size of the access control configuration generated
低级访问控制必须提供允许或拒绝操作的有效机制,因此通常基于访问矩阵。但是,当将效率目标与对最低权限和更高级别授权属性(如信息流机密性)的支持结合在一起时,生成的访问控制编码将变得繁琐。组合高级规范可以更加简洁。当与管理控制结合使用时,它们可以健壮地以受控的方式更改授权内容。这样的规范承诺更容易配置和理解,实际上可以自动分析授权属性。然而,如何从高层规范生成低层访问控制配置的问题仍然存在。在本文中,我们描述了一种分解算法,以算法方式将信息流授权属性的高级规范转换为低级访问控制。此外,给出了几个优化,这些优化大大减少了生成的访问控制配置的大小
{"title":"Factoring high level information flow specifications into low level access controls","authors":"Kevin Kahley, M. Radhakrishnan, Jon A. Solworth","doi":"10.1109/IWIA.2006.8","DOIUrl":"https://doi.org/10.1109/IWIA.2006.8","url":null,"abstract":"Low level access controls must provide efficient mechanisms for allowing or denying operations and hence are typically based on the access matrix. However, when combining the goals of efficiency along with the support for least privilege and higher level authorization properties (such as information flow confidentiality), the resulting access controls become tedious to encode. Compositional high level specifications can be much more succinct. When combined with administrative controls, they can be robust in changing what is authorized in a controlled manner. Such specifications offer the promise of being easier to configure and understand, and in fact can be automatically analyzed for authorization properties. However, there remains the issue of how to generate the low level access control configuration from the high level specification. In this paper, we describe a factoring algorithm to algorithmically translate a high level specification of information flow authorization properties into low level access controls. In addition, several optimizations are given which dramatically reduce the size of the access control configuration generated","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing a secure point-of-sale system 设计一个安全的销售点系统
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.6
A. Pedersen, Anders Hedegaard, Robin Sharp
This paper describes some experiences with using the Common Criteria for Information Security Evaluation as the basis for a design methodology when designing secure systems. As an example, the design process for a point-of-sale (POS) system is described
本文描述了在设计安全系统时使用信息安全评估通用标准作为设计方法基础的一些经验。作为一个例子,描述了销售点(POS)系统的设计过程
{"title":"Designing a secure point-of-sale system","authors":"A. Pedersen, Anders Hedegaard, Robin Sharp","doi":"10.1109/IWIA.2006.6","DOIUrl":"https://doi.org/10.1109/IWIA.2006.6","url":null,"abstract":"This paper describes some experiences with using the Common Criteria for Information Security Evaluation as the basis for a design methodology when designing secure systems. As an example, the design process for a point-of-sale (POS) system is described","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127078703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High robustness requirements in a Common Criteria protection profile 公共标准保护配置文件中的高健壮性要求
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.13
Thuy D. Nguyen, T. Levin, C. Irvine
The development of a Common Criteria Protection Profile for high robustness separation kernels requires explicit modifications of several common criteria requirements as well as extrapolation from existing (e.g., medium robustness) guidance and decisions. The draft U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness (SKPP) is intended to be applicable to a class of products (the target of evaluation, or TOE) that includes, but is not limited to, real time and embedded systems. This paper describes certain SKPP concepts and requirements and provides underlying motivations and rationale for their inclusion in the SKPP. Primary areas of focus are the security requirements regarding information flow, dynamic configuration, and the application of the principle of least privilege to restrict actions of active entities
高鲁棒性分离核的通用标准保护概要的开发需要对几个通用标准要求进行明确的修改,以及从现有的(例如,中等鲁棒性)指导和决策中进行推断。美国政府要求高鲁棒性环境中分离核保护概要草案(SKPP)旨在适用于一类产品(评估目标,或TOE),包括但不限于实时和嵌入式系统。本文描述了某些SKPP概念和需求,并提供了将它们包含在SKPP中的潜在动机和基本原理。主要关注的领域是与信息流、动态配置和最小权限原则的应用有关的安全需求,以限制活动实体的操作
{"title":"High robustness requirements in a Common Criteria protection profile","authors":"Thuy D. Nguyen, T. Levin, C. Irvine","doi":"10.1109/IWIA.2006.13","DOIUrl":"https://doi.org/10.1109/IWIA.2006.13","url":null,"abstract":"The development of a Common Criteria Protection Profile for high robustness separation kernels requires explicit modifications of several common criteria requirements as well as extrapolation from existing (e.g., medium robustness) guidance and decisions. The draft U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness (SKPP) is intended to be applicable to a class of products (the target of evaluation, or TOE) that includes, but is not limited to, real time and embedded systems. This paper describes certain SKPP concepts and requirements and provides underlying motivations and rationale for their inclusion in the SKPP. Primary areas of focus are the security requirements regarding information flow, dynamic configuration, and the application of the principle of least privilege to restrict actions of active entities","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A remote IT security evaluation scheme: a proactive approach to risk management 远程IT安全评估方案:一种前瞻性的风险管理方法
Pub Date : 2006-04-13 DOI: 10.1109/IWIA.2006.1
Suleyman Kondakci
We present a new model to conduct security evaluation of remote assets with dedicated profiles. An alternative approach to risk management in information assurance (IA) and a related protocol for remote evaluation of information assets is presented here. Application of this protocol ensures long-term risk management, hence efficient proactive lifecycle protection of critical information systems. Due to its generic and interoperable structure based on the modern Web technologies, the protocol can be applied to risk assessment and evaluation of a multitude type of systems. The protocol consists of a secure communication architecture associated with each asset a security profile, and software services and agents that communicate over the Internet and other open networks. The secure communication architecture uses a secure exchange protocol incorporating the fast elliptic curve cryptography. Interoperable, continuous, inexpensive, time- and location-neutral, and minimum resource usage are some of its advantages. With this new notion, we also aim at inspiring developers and researchers to develop value-added security evaluation tools, techniques and procedures
我们提出了一种新的模型来对具有专用配置文件的远程资产进行安全评估。本文介绍了信息保障(IA)风险管理的另一种方法和远程评估信息资产的相关协议。该协议的应用确保了长期的风险管理,从而有效地主动保护关键信息系统的生命周期。由于其基于现代Web技术的通用性和互操作性结构,该协议可以应用于多种类型系统的风险评估和评价。该协议包括与每个资产相关联的安全通信体系结构、安全配置文件以及通过Internet和其他开放网络进行通信的软件服务和代理。安全通信体系结构采用结合快速椭圆曲线加密的安全交换协议。可互操作、连续、廉价、时间和位置无关以及最小的资源使用是它的一些优点。有了这个新概念,我们还旨在激励开发人员和研究人员开发增值的安全评估工具、技术和程序
{"title":"A remote IT security evaluation scheme: a proactive approach to risk management","authors":"Suleyman Kondakci","doi":"10.1109/IWIA.2006.1","DOIUrl":"https://doi.org/10.1109/IWIA.2006.1","url":null,"abstract":"We present a new model to conduct security evaluation of remote assets with dedicated profiles. An alternative approach to risk management in information assurance (IA) and a related protocol for remote evaluation of information assets is presented here. Application of this protocol ensures long-term risk management, hence efficient proactive lifecycle protection of critical information systems. Due to its generic and interoperable structure based on the modern Web technologies, the protocol can be applied to risk assessment and evaluation of a multitude type of systems. The protocol consists of a secure communication architecture associated with each asset a security profile, and software services and agents that communicate over the Internet and other open networks. The secure communication architecture uses a secure exchange protocol incorporating the fast elliptic curve cryptography. Interoperable, continuous, inexpensive, time- and location-neutral, and minimum resource usage are some of its advantages. With this new notion, we also aim at inspiring developers and researchers to develop value-added security evaluation tools, techniques and procedures","PeriodicalId":156960,"journal":{"name":"Fourth IEEE International Workshop on Information Assurance (IWIA'06)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Fourth IEEE International Workshop on Information Assurance (IWIA'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1