Intelligent assessment of distributed security in TCP/IP networks

被引:0
|
作者
Cardoso, RC [1 ]
Freire, MM [1 ]
机构
[1] Univ Beira Interior, Dept Informat, P-6200001 Covilha, Portugal
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of the dynamics of networks interconnection, security issues became a critical point that needs to be considered. The widely adopted solution considers a mix of routers, switches, firewalls and virtual private networks (VPNs) together with the deployment of intrusion detection systems (IDSs) and vulnerability assessment tools. In a proactive approach for intrusions, vulnerability assessment tools allow the detection of vulnerabilities, before they could be exploited. In this paper, we propose an extension to this model, by using a distributed approach based on software agents, to correctly evaluate the network security risks, making an assessment of the distributed security. Based in this model, we develop an algorithm for detecting and enumerating security risks in each active element of a network. The information gathered was used to build a security knowledge assessment. Using these techniques, the information is faster disseminated, which could lead to a more updated assessment of the security issues in the network. There is also an increasing of the awareness to security, since the network managers are more focused on the reported security issues.
引用
收藏
页码:1092 / 1099
页数:8
相关论文
共 50 条
  • [1] Integration of security services into networks: Comparing TCP/IP-security and ATM-security
    Leitold, H
    [J]. ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 77 - 93
  • [2] SECURITY ANALYSIS OF TCP/IP NETWORKS An Approach to Automatic Analysis of Network Security Properties
    Sveda, Miroslav
    Rysavy, Ondrej
    Matousek, Petr
    Rab, Jaroslav
    Cejka, Rudolf
    [J]. DCNET 2010/OPTICS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING AND INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATION SYSTEM, 2010, : 5 - 11
  • [3] On end-to-end security for Bluetooth/WAP & TCP/IP networks
    Sengodan, S
    Smith, D
    Abou-Rizk, M
    [J]. 2000 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2000, : 399 - 403
  • [4] A multilayer IP security protocol for TCP performance enhancement in wireless networks
    Zhang, YG
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (04) : 767 - 776
  • [5] A new design proposal for intelligent routers to avoid congestion in TCP/IP networks
    Pujeri, RV
    Sivanandam, SN
    [J]. INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2005, 12 (06) : 481 - 486
  • [6] A topological characterization of TCP/IP security
    Vigna, G
    [J]. FME 2003: FORMAL METHODS, PROCEEDINGS, 2003, 2805 : 914 - 940
  • [7] TCP/IP Protocol Security Problems and Defenses
    Zhi Kanmai
    [J]. 2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 117 - 120
  • [8] TCP/IP security threats and attack methods
    Enterprise Risk Services, Deloitte Touche Tohmatsu, Wellington, New Zealand
    不详
    [J]. Comput Commun, 10 (885-897):
  • [9] TCP IP security threats and attack methods
    Harris, B
    Hunt, R
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (10) : 885 - 897
  • [10] A security architecture of TCP/IP protocol suite
    Chen, X.
    Zhu, G.
    Xiao, D.
    [J]. Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 2001, 29 (03): : 15 - 17