Security issues and vulnerabilities of the SNMP protocol

被引:0
|
作者
Chatzimisios, P [1 ]
机构
[1] Bournemouth Univ, Sch Design Engn & Comp, Poole BH12 5BB, Dorset, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, communication networks are composed of many interconnected heterogeneous resources and network management plays a critical role. A complete network management solution must be simple, intuitive, easy to use and consistent. It also should ensure ease of deployment, security and the ability to deploy additional solutions quickly. Especially, the security of the network management is probably the most important attribute since it is likely to affect the total security of a system. In this paper, we attempt to shed some light on many issues involved with the security of network management by exploring the security vulnerabilities and threats that the current management schemes have.
引用
下载
收藏
页码:74 / 77
页数:4
相关论文
共 50 条
  • [21] Security issues in WAP WTLS protocol
    Radhamani, G
    Ramasamy, K
    2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 483 - 487
  • [22] Enhancements of LEACH Protocol: Security and Open Issues
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Al-huthaifi, Rasha K.
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2017,
  • [23] WoT Communication Protocol Security and Privacy Issues
    Murawat, Sadia
    Tahir, Fahima
    Anjum, Maria
    Soomro, Mudasar Ahmed
    Siraj, Saima
    Memon, Zojan
    Muhammad, Anees
    Bux, Khuda
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (03) : 155 - 161
  • [24] Security and privacy issues towards ENUM protocol
    Kambourakis, G
    Geneiatakis, D
    Gritzalis, S
    Dagiuklas, T
    Lambrinoudakis, C
    2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 478 - 483
  • [25] Security issues in a group key establishment protocol
    Mitchell, Chris J.
    COMPUTER JOURNAL, 2019, 62 (03): : 373 - 376
  • [26] What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol
    Kim, Kyounggon
    Cho, Kiyoon
    Lim, Jihwan
    Jung, Young Ho
    Sung, Min Seok
    Kim, Seong Beom
    Kim, Huy Kang
    PERVASIVE AND MOBILE COMPUTING, 2020, 66
  • [27] Security issues of distance vector routing protocol and its advancement in security
    Singh, Nikita
    Chauhan, Pavitra
    Chandra, Nidhi
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 529 - 532
  • [28] A STUDY OF THE LANDSCAPE OF SECURITY ISSUES, VULNERABILITIES, AND DEFENSE MECHANISMS IN WEB BASED APPLICATIONS
    Rahimi, Nick
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 806 - 811
  • [30] An XML-Based testing strategy for probing security vulnerabilities in the diameter protocol
    Wang, Daping
    BELL LABS TECHNICAL JOURNAL, 2007, 12 (03) : 79 - 93