2009
DOI: 10.1007/s10207-009-0077-2
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring security in depth based on heterogeneous network security technologies

Abstract: With the explosive growth of Internet connectivity that includes not only end-hosts but also pervasive devices, security becomes a requirement for enterprises. Although a significant effort has been made by the research community to develop defense techniques against security attacks, less focus has been given to manage security configuration efficiently. Network security devices, such as firewalls, intrusion detection and prevention systems, honeypot as well as vulnerability scanner, operate as a stand-alone … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…The third pillar, ''availability,'' is especially significant, as it specifically makes critical data available in situations in which it would not be otherwise available. Thus, it would be considered a component of ''Security in Depth'' [47]. In addition to the CIA triad, our proposed system implements the three A's of data security: authorization, authentication, and accounting'' [48].…”
Section: Solution For Ehealthmentioning
confidence: 99%
“…The third pillar, ''availability,'' is especially significant, as it specifically makes critical data available in situations in which it would not be otherwise available. Thus, it would be considered a component of ''Security in Depth'' [47]. In addition to the CIA triad, our proposed system implements the three A's of data security: authorization, authentication, and accounting'' [48].…”
Section: Solution For Ehealthmentioning
confidence: 99%
“…antivirus software, antimalware etc.). Passive threat-detecting systems usually employ certain selfadaptability (e.g [3]). Recently, together with the quickly growing market of Internet of Things (IoT), new industrial systems connected to the Internet emerge that must be protected as well.…”
Section: Network Threat Monitoring Fundamentalsmentioning
confidence: 99%
“…The rules and their format are used by the Colander IDS, as they were the most wide spread and available rule set. Suricata 2 software is backed by Open Information Security Foundation (OISF) 3 . Its first beta version was released in 2009 while the first stable release in July 2010.…”
Section: Intrusion Detection and Prevention Systemsmentioning
confidence: 99%
“…In this scenario, honeypots [3][4][5][6][7][8][9] can be useful for two main goals. The first one concerns the significant possible aid in discovering rootkits, Trojans, and potential network risks.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, network managers and skilled single users are trying to deploy suitable defense tools, such as firewalls, virus scanning, and intrusion detection systems [1][2][3]. Generally these tools can significantly benefit from the knowledge of the nature of attacks.…”
Section: Introductionmentioning
confidence: 99%