Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics

被引:5
|
作者
Hunt, Ray [1 ]
Slay, Jill [2 ]
机构
[1] Univ Canterbury, Dept Comp Sci & Software Engn, Networks & Secur, Christchurch, New Zealand
[2] Univ South Australia, Div IT Engn & Environm, Res, Adelaide, SA, Australia
关键词
D O I
10.1109/PST.2010.5593243
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent years have seen substantial development in computer and network security design. This has been manifested as an every increasing range of new protocols, new encryption algorithms, new methods of authentication, smarter firewalls and intrusion detection techniques, new anti-malware products and many more. During the same period of time increasing demands for more trustworthy network infrastructure have seen the development of sophisticated analysis tools necessary to meet the operational requirements of law enforcement agencies. These include tools for e-discovery, commercial intelligence and national security. Thus the industry has seen equally significant developments in computer forensic tools where methods of searching for and detection of, malicious activity for presentation as evidence and provision of trust have become ever more sophisticated. To a considerable degree the science of security and forensics have seen both rapid but separate developments. This paper proposes that there are areas in common between these two important fields of endeavour and sets out techniques and ideas which demonstrate how they can overlap and work together in order to provide improved security and trustworthiness in critical infrastructures. In particular this paper addresses computer security and forensic analysis from a real-time perspective such that security events can be monitored in a live network while sound forensic data collection, storage and processing can be carried out in a manner which supports real-time security and at the same time still meeting the requirements of sound evidence.
引用
收藏
页码:23 / 30
页数:8
相关论文
共 50 条
  • [41] Critical infrastructure protection security layer for DNP3 devices
    Nabhani, Farhad
    Mander, Todd
    Hodgson, Simon
    Shelton, Paul
    International Journal of Manufacturing Research, 2012, 7 (01) : 72 - 85
  • [42] Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges
    Baldassarre, Gianluca
    CRITICAL INFRASTRUCTURE PROTECTION AGAINST HYBRID WARFARE SECURITY RELATED CHALLENGES, 2016, 46 : 97 - 105
  • [43] State Based Network Isolation for Critical Infrastructure Systems Security
    Conklin, Wm. Arthur
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 2280 - 2287
  • [44] Analysis and Recommendations for Network and Communication Security for Mission Critical Infrastructure
    Roy, Sudipto
    Nene, Manisha J.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [45] Network-Centric Violence, Critical Infrastructure and the Urbanization of Security
    Coward, Martin
    SECURITY DIALOGUE, 2009, 40 (4-5) : 399 - 418
  • [46] Usable Security Management for Network Access Rules of Critical Infrastructure
    Yun, Jeong-Han
    Choi, Seungoh
    Kim, Woonyon
    Kang, Hwasun
    Kim, Sung-Woo
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 432 - 447
  • [47] Discussion and Practice of Computer Network Information and Network Security Protection Strategy
    Liu, Li
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1810 - 1813
  • [48] Critical infrastructure security confidence through automated thermal imaging
    Francisco, Glen
    Roberts, Sharon
    Hanna, Keith
    Heubusch, Jeffrey
    INFRARED TECHNOLOGY AND APPLICATIONS XXXII, PTS 1AND 2, 2006, 6206
  • [49] Establishment of the European Reference Network for Critical Infrastructure Protection (ERNCIP)
    Kourti, Naouma
    Borsos, Ferenc
    Gattinesi, Peter
    FUTURE SECURITY, 2012, 318 : 273 - 276
  • [50] Towards Automatic Critical Infrastructure Protection through Machine Learning
    Cazorla, Lorena
    Alcaraz, Cristina
    Lopez, Javier
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013, 2013, 8328 : 197 - 203