2018
DOI: 10.4018/978-1-5225-5736-4.ch010
|View full text |Cite
|
Sign up to set email alerts
|

Network Access Control and Collaborative Security Against APT and AET

Abstract: Cybercrime is rising due to the appearance of a new generation of attacks, APT and AET, and the reactionary aspect of the protection systems implemented in the IP networks. In this chapter, the authors analyze the gap between the innovative aspect of those attacks and the reactive aspect of the security measures put in place inside victim networks. The challenge is to shift this security aspect from reactive to proactive by adopting a collaborative approach based on NAC technology as a multi-level protection a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…One of the main reasons why SIEM systems have become an essential part of monitoring and defending networks and hosts against intrusions is their ability to use their correlation engine to detect complex attacks that typically go unnoticed by most defense security devices. For instance, the authors in (Orhanou et al , 2018) highlighted this by studying many use cases where AET (advanced evasion techniques) and APT (Advanced Persistent Attacks) are executed in a chained matter and key security elements such as IPS, Firewall, WAF and AntiSpam fail to react simply because they operate in series and don’t share information. In this context, they proposed to use IF-MAP as a security standard exchange protocol to share information in real-time, but their proposal is only effective when tools like SIEM systems are implemented, tools that aggregate and correlate events in real-time and view the network as a whole instead of fragmented parts.…”
Section: Related Workmentioning
confidence: 99%
“…One of the main reasons why SIEM systems have become an essential part of monitoring and defending networks and hosts against intrusions is their ability to use their correlation engine to detect complex attacks that typically go unnoticed by most defense security devices. For instance, the authors in (Orhanou et al , 2018) highlighted this by studying many use cases where AET (advanced evasion techniques) and APT (Advanced Persistent Attacks) are executed in a chained matter and key security elements such as IPS, Firewall, WAF and AntiSpam fail to react simply because they operate in series and don’t share information. In this context, they proposed to use IF-MAP as a security standard exchange protocol to share information in real-time, but their proposal is only effective when tools like SIEM systems are implemented, tools that aggregate and correlate events in real-time and view the network as a whole instead of fragmented parts.…”
Section: Related Workmentioning
confidence: 99%