Lee et al., 2010 - Google Patents
Vulnerabilities leading to denial of services attacks in grid computing systems: a surveyLee et al., 2010
- Document ID
- 7406694882149801409
- Author
- Lee W
- Squicciarini A
- Bertino E
- Publication year
- Publication venue
- Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
External Links
Snippet
Grid is designed with no security in mind at first. The complexity and scalability of grid architecture make easy for intruders to attack the system in several ways. In this paper, we discuss several possible or known vulnerabilities existing in each layer of the grid system …
- 239000006071 cream 0 description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fernandez et al. | A critical analysis of Zero Trust Architecture (ZTA) | |
Ren et al. | SILedger: A blockchain and ABE-based access control for applications in SDN-IoT networks | |
Bhargavan et al. | An advisor for web services security policies | |
JP2009518762A (en) | A method for verifying the integrity of a component on a trusted platform using an integrity database service | |
Wang et al. | Perm-guard: Authenticating the validity of flow rules in software defined networking | |
Lonea et al. | Identity management for cloud computing | |
Cirnu et al. | Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture | |
Yu et al. | BC-BLPM: A multi-level security access control model based on blockchain technology | |
CN1855814A (en) | Safety uniform certificate verification design | |
Pramanik et al. | Security policies to mitigate insider threat in the document control domain | |
Tasch et al. | Security analysis of security applications for software defined networks | |
Rahaman et al. | Soap-based secure conversation and collaboration | |
Morovati et al. | A network based document management model to prevent data extrusion | |
Cordis et al. | Considerations in mitigating Kerberos vulnerabilities for active directory | |
JP3756397B2 (en) | ACCESS CONTROL METHOD, ACCESS CONTROL DEVICE, AND RECORDING MEDIUM | |
Phan | Service oriented architecture (soa)-security challenges and mitigation strategies | |
Alam et al. | Usage control platformization via trustworthy SELinux | |
Khari et al. | Comprehensive study of web application attacks and classification | |
Chadwick | Threat modelling for active directory | |
CN117579291A (en) | Cloud primary multi-cloud management method, system, electronic equipment and storage medium | |
Lee et al. | Vulnerabilities leading to denial of services attacks in grid computing systems: a survey | |
Jensen | Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks | |
Khattak et al. | Security, trust and privacy (STP) framework for federated single sign-on environment | |
Yoshihama et al. | WS-attestation: Enabling trusted computing on Web services | |
Li et al. | A Database Security Access Control Method Based on Identity Authentication |