Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks
نویسندگان
چکیده
Addressing security vulnerabilities and system intrusions can represent a significant administrative overhead in current computer systems. Although technologies exist for both vulnerability scanning and for intrusion detection, the problems typically require some form of human intervention before they can be rectified. Evidence suggests that, in many cases, this can lead to omissions or oversights in terms of protection, as administrators are forced to prioritise their attention to security amongst various other tasks (particularly within smaller organisations, where a dedicated security administration function is unlikely to be found). As a result, mechanisms for automated response to the issues are considered to be advantageous. The paper describes the problems associated with vulnerability analysis and intrusion response, and then proceeds to consider how, at a conceptual level, the issues could be addressed within the framework of a wider architecture for intrusion monitoring.
منابع مشابه
An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملMitigating Intrusion and Vulnerabilities in Cognitive Radio Networks
The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generation wireless networks that can optimize the use of spectrum due to its unique and dynamic properties, but the high rate of intrusions has frus...
متن کاملCyber-Physical System Security and Impact Analysis
Electric power grids have been identified as critical infrastructures. They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities. It can be envisioned that on top of the power infrastructure reside ICT layers that are coupled with the electric grids. As the ICT connectivity increases, so does the potential for cyber...
متن کاملAgent-based modelling and simulation of network cyber-attacks and cooperative defence mechanisms
The important problem in network security which solution is urgently needed is the investigation of counteraction between malefactors and defence systems in computer networks, including the Internet, and the creation of effective cyber-defence systems. It is important to underline that experienced malefactors realize sophisticated strategies of cyber-attacks. These strategies can include: Inf...
متن کاملData mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
-Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtain good accuracy a relevant or efficient dataset should be there to detect the known attacks and unknown attacks. Therefore, there are numerous security systems and intrusion dete...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001