2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS) 2013
DOI: 10.1109/idaacs.2013.6662634
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of virtual security appliances (VSA) for SME

Abstract: The deployment of new security technologies in existing network topologies requires exhaustive testing before usage to avoid down time of the production systems. Nowadays, the required testing is in many cases omitted due to the complexity of creating test cases and experimental set ups. The VISA (Virtual IT Security Architectures) project [1], funded by the German Federal Ministry of Research, aims to provide a simulation environment for semi-automated deployment of experiments based on system models. Buildin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…2) The Topology Editor: The Topology Editor 3 [31] provides the general user interface required for interaction with the IRP. The back-end communication of the Topology Editor is handled by IO-X.…”
Section: ) the Io Tool-setmentioning
confidence: 99%
“…2) The Topology Editor: The Topology Editor 3 [31] provides the general user interface required for interaction with the IRP. The back-end communication of the Topology Editor is handled by IO-X.…”
Section: ) the Io Tool-setmentioning
confidence: 99%
“…Cloud infrastructure presents challenges for traditional cyber-security products. For example, general network scanning [99] assumes the infrastructure is local and/or reachable for scanning purposes, an assumption valid only for private infrastructure. The increasing suite of cloud-based network perimeter scanning services [100,101,102] require explicit input from users on the target devices to be scanned.…”
Section: Technical Challengesmentioning
confidence: 99%