Security issues and vulnerabilities of the SNMP protocol

被引:0
|
作者
Chatzimisios, P [1 ]
机构
[1] Bournemouth Univ, Sch Design Engn & Comp, Poole BH12 5BB, Dorset, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, communication networks are composed of many interconnected heterogeneous resources and network management plays a critical role. A complete network management solution must be simple, intuitive, easy to use and consistent. It also should ensure ease of deployment, security and the ability to deploy additional solutions quickly. Especially, the security of the network management is probably the most important attribute since it is likely to affect the total security of a system. In this paper, we attempt to shed some light on many issues involved with the security of network management by exploring the security vulnerabilities and threats that the current management schemes have.
引用
下载
收藏
页码:74 / 77
页数:4
相关论文
共 50 条
  • [31] Improving Security Issues in MANET AODV Routing Protocol
    Gharehkoolchian, Mahsa
    Hemmatyar, A. M. Afshin
    Izadi, Mohammad
    AD HOC NETWORKS, 2015, 155 : 237 - 250
  • [32] Evaluation of address resolution protocol and essential security issues
    Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Uttar Pradesh, Lucknow, India
    Proc. Int. Conf. Intell. Sustain. Syst., ICISS, 1600, (1088-1091):
  • [33] An Exploration of Some Security Issues Within the BACnet Protocol
    Peacock, Matthew
    Johnstone, Michael N.
    Valli, Craig
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 252 - 272
  • [34] Security Issues of a Recent RFID Multi Tagging Protocol
    Ozcanhan, Mehmet Hilal
    Baytar, Sezer
    Utku, Semih
    Dalkilic, Gokhan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 11 - 15
  • [35] Evaluation of Address Resolution Protocol and Essential Security Issues
    Singh, Ravi Pratap
    Dhanda, Namrata
    Agrawal, Krishna Kant
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1088 - 1091
  • [36] SECURITY SYSTEM VULNERABILITIES
    Constantinescu, Nicolae
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 175 - 179
  • [37] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [38] Moodle Security Vulnerabilities
    Galan Hernandez, Juan Carlos
    Leon Chavez, Miguel Angel
    2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 199 - 204
  • [39] Security Vulnerabilities in LoRaWAN
    Yang, Xueying
    Karampatzakis, Evgenios
    Doerr, Christian
    Kuipers, Fernando
    2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2018, : 129 - 140
  • [40] Security vulnerabilities assessment of the X.509 protocol by syntax-based testing
    Turcotte, Y
    Tal, O
    Knight, S
    Dean, T
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1572 - 1578