Security issues and vulnerabilities of the SNMP protocol

被引:0
|
作者
Chatzimisios, P [1 ]
机构
[1] Bournemouth Univ, Sch Design Engn & Comp, Poole BH12 5BB, Dorset, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, communication networks are composed of many interconnected heterogeneous resources and network management plays a critical role. A complete network management solution must be simple, intuitive, easy to use and consistent. It also should ensure ease of deployment, security and the ability to deploy additional solutions quickly. Especially, the security of the network management is probably the most important attribute since it is likely to affect the total security of a system. In this paper, we attempt to shed some light on many issues involved with the security of network management by exploring the security vulnerabilities and threats that the current management schemes have.
引用
收藏
页码:74 / 77
页数:4
相关论文
共 50 条
  • [1] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    [J]. NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [2] Vulnerabilities and Security Issues in Optical Networks
    Furdek, Marija
    Skorin-Kapov, Nina
    Zsigmond, Szilard
    Wosinska, Lena
    [J]. 2014 16TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2014,
  • [3] Multiple vulnerabilities in SNMP
    Jiang, GF
    [J]. COMPUTER, 2002, : 2 - 4
  • [4] Analysis of the DoIP Protocol for Security Vulnerabilities
    Wachter, Patrick
    Kleber, Stephan
    [J]. PROCEEDINGS OF 6TH ACM COMPUTER SCIENCE IN CARS SYMPOSIUM, CSCS 2022, 2022,
  • [5] Design of EDI security MIB based on SNMP protocol
    Park, TK
    [J]. WORLDWIDE COMPUTING AND ITS APPLICATIONS - WWCA'98, 1998, 1368 : 293 - 308
  • [6] Security Issues and Vulnerabilities in Connected Car Systems
    Becsi, Tamas
    Aradi, Szilard
    Gaspar, Peter
    [J]. 2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2015, : 477 - 482
  • [7] An Overview of the EMV Protocol and Its Security Vulnerabilities
    El Madhoun, Nour
    Bertin, Emmanuel
    Pujolle, Guy
    [J]. PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [8] Protocol fuzzing to find security vulnerabilities of RabbitMQ
    Kwon, Soonhong
    Son, Sang-Jin
    Choi, Yangseo
    Lee, Jong-Hyouk
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [9] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL
    Geneiatakis, Dimitris
    Dagiuklas, Tasos
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    Ehlert, Sven
    Sisalem, Dorgham
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 68 - 81
  • [10] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437