Security issues and vulnerabilities of the SNMP protocol

被引:0
|
作者
Chatzimisios, P [1 ]
机构
[1] Bournemouth Univ, Sch Design Engn & Comp, Poole BH12 5BB, Dorset, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, communication networks are composed of many interconnected heterogeneous resources and network management plays a critical role. A complete network management solution must be simple, intuitive, easy to use and consistent. It also should ensure ease of deployment, security and the ability to deploy additional solutions quickly. Especially, the security of the network management is probably the most important attribute since it is likely to affect the total security of a system. In this paper, we attempt to shed some light on many issues involved with the security of network management by exploring the security vulnerabilities and threats that the current management schemes have.
引用
收藏
页码:74 / 77
页数:4
相关论文
共 50 条
  • [41] Security within SNMP version 3
    Sellin, Ruediger
    ComTec, 77 (07): : 14 - 22
  • [42] Improving the security of SNMP in wireless networks
    Otrok, H
    Mourad, A
    Debbabi, A
    Assi, C
    2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, : 198 - 202
  • [43] Algorithm for discovering SNMP protocol vulnerability
    Wang, Zhiqiang
    Zhang, Yuqing
    Liu, Qixu
    Huang, Tingpei
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2015, 42 (04): : 20 - 26
  • [44] IoT Security: A review of vulnerabilities and security protocols
    Varma, Ravi Kiran P.
    Priyanka, M.
    Krishna, Vamsi B. S.
    Raju, Subba K., V
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520
  • [45] KILAVI wireless communication protocol for the building environment -: Security issues
    Sikkila, Hannu
    Soini, Mikael
    Oksa, Petri
    Sydanheimo, Lauri
    Kivikoski, Markku
    2006 IEEE TENTH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, PROCEEDINGS, 2006, : 640 - +
  • [46] Security issues in Sarkar's e-cash protocol
    Barguil, Joao M. M.
    Barreto, Paulo S. L. M.
    INFORMATION PROCESSING LETTERS, 2015, 115 (11) : 801 - 803
  • [47] Security vulnerabilities in DNS and DNSSEC
    Ariyapperuma, Suranjith
    Mitchell, Chris J.
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 335 - +
  • [48] Exploring The Security Vulnerabilities of LoRa
    Aras, Emekcan
    Ramachandran, Gowri Sankar
    Lawrence, Piers
    Hughes, Danny
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 361 - 366
  • [49] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [50] Measuring Similarity for Security Vulnerabilities
    Wang, Ju An
    Zhou, Linfeng
    Guo, Minzhe
    Wang, Hao
    Camargo, Jairo
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 962 - 971