Design issues of ‘ Vulnerabilities and Suspicious behavior detection system ’ in Storage Area Network ( SAN )
نویسندگان
چکیده
Current accelerated demand of business continuity of operations in 24 × 7 work environment has increased the importance and amount of the data stored on computers and Storage Area Networks (SAN). A lot of security issues are pending related to the performance and ability of such high-speed network architecture. There is tremendous risk in the available intrusion detection systems and the security issues are remaining pending. This paper takes a review of existing available IDSs and describes various important design issues and some suspicious activities, Vulnerabilities in to the SAN. In the last section of the paper we represented important useful conclusions on above review for future design of IDSs for SAN.
منابع مشابه
A Clustering based Intrusion Detection System for Storage Area Network
A storage area network (SAN) is a high-speed and widely used special-purpose network that interconnects different kinds of storage devices with associated data servers on behalf of a larger network of users. SAN security is a specialized field dealing with issues related to the storage industry, it follows the same established principles found in all modern IT security. Therefore, it requires a...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملThe effect of supply network configuration on occurring chaotic behavior in the retailer’s inventory
ToToday’s market place is increasingly dynamic and volatile. In this area supply network issues recently have attracted a lot of attention from industrial practitioners and academics worldwide. Chaos theory is the study of complex, nonlinear, dynamic systems. For chaotic systems, a tiny change in conditions may result in an enormous change in system output, whereas substantial changes in condit...
متن کاملAlgebraic Matching of Vulnerabilities in a Low-Level Code
This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009