TAILIEUCHUNG - An Ontology for Network Security Attacks

The large size, heterogeneity, and distributed nature of networks give administrators a large number of degrees of freedom to consider when configuration changes need to be made. The proper functioning of the network as a whole is a result of the coordinated configuration of multiple network elements whose interaction gives rise to the desired behaviors. The number of options to consider and the complexity of the interactions and interdependencies between various protocols and applications make it a very hard task to reason about configuration changes. Nevertheless, large networks due to their dynamic nature demand that such configuration changes be made frequently and that such changes be implemented both quickly and correctly | An Ontology for Network Security Attacks Andrew Simmonds1 Peter Sandilands1 Louis van Ekert1 faculty of IT University of Technology Sydney PO Box 123 Broadway NSW 2007 Australia simmonds psandy ekertl @ Abstract. We first consider network security services and then review threats vulnerabilities and failure modes. This review is based on standard texts using well-known concepts categorizations and methods . risk analysis using asset-based threat profiles and vulnerability profiles attributes . The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1. Keywords network cyber security ontology attack threat vulnerability failure. 1 Introduction This article was written as a result of the authors teaching a network security subject in the Faculty of IT at the University of Technology Sydney. There are many concepts which need to be well understood by network security students and practitioners. To assist in this there have been several attempts to classify different aspects of the subject area. This article lists some of the common taxonomies shows the relationship between them and modifies or extends them where appropriate to make them consistent and then defines an extensible ontology for network security based on this material. The article provides a framework to locate these taxonomies in the network security subject area. The aim of this article is thus to provide a new and improved understanding of the linkages between different components of a network security system. In part 2 we consider security services in part 3 we look at threats and system weaknesses in part 4 we review failure modes - recognizing that perfect security is not achievable in practice and finally in part 5 we define an ontology for network security attacks 2 Security Services There are two mnemonics commonly used to summarize services which a .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.