[go: up one dir, main page]

Lee et al., 2010 - Google Patents

Vulnerabilities leading to denial of services attacks in grid computing systems: a survey

Lee et al., 2010

Document ID
7406694882149801409
Author
Lee W
Squicciarini A
Bertino E
Publication year
Publication venue
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research

External Links

Snippet

Grid is designed with no security in mind at first. The complexity and scalability of grid architecture make easy for intruders to attack the system in several ways. In this paper, we discuss several possible or known vulnerabilities existing in each layer of the grid system …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Fernandez et al. A critical analysis of Zero Trust Architecture (ZTA)
Ren et al. SILedger: A blockchain and ABE-based access control for applications in SDN-IoT networks
Bhargavan et al. An advisor for web services security policies
JP2009518762A (en) A method for verifying the integrity of a component on a trusted platform using an integrity database service
Wang et al. Perm-guard: Authenticating the validity of flow rules in software defined networking
Lonea et al. Identity management for cloud computing
Cirnu et al. Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture
Yu et al. BC-BLPM: A multi-level security access control model based on blockchain technology
CN1855814A (en) Safety uniform certificate verification design
Pramanik et al. Security policies to mitigate insider threat in the document control domain
Tasch et al. Security analysis of security applications for software defined networks
Rahaman et al. Soap-based secure conversation and collaboration
Morovati et al. A network based document management model to prevent data extrusion
Cordis et al. Considerations in mitigating Kerberos vulnerabilities for active directory
JP3756397B2 (en) ACCESS CONTROL METHOD, ACCESS CONTROL DEVICE, AND RECORDING MEDIUM
Phan Service oriented architecture (soa)-security challenges and mitigation strategies
Alam et al. Usage control platformization via trustworthy SELinux
Khari et al. Comprehensive study of web application attacks and classification
Chadwick Threat modelling for active directory
CN117579291A (en) Cloud primary multi-cloud management method, system, electronic equipment and storage medium
Lee et al. Vulnerabilities leading to denial of services attacks in grid computing systems: a survey
Jensen Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks
Khattak et al. Security, trust and privacy (STP) framework for federated single sign-on environment
Yoshihama et al. WS-attestation: Enabling trusted computing on Web services
Li et al. A Database Security Access Control Method Based on Identity Authentication