Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/2784
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Atay, Serap | - |
dc.contributor.author | Masera, Marcelo | - |
dc.date.accessioned | 2017-01-13T11:50:53Z | - |
dc.date.available | 2017-01-13T11:50:53Z | - |
dc.date.issued | 2011-02 | - |
dc.identifier.citation | Atay, S., and Masera, M. (2011). Challenges for the security analysis of next generation networks. Information Security Technical Report, 16(1), 3-11. doi:10.1016/j.istr.2010.10.010 | en_US |
dc.identifier.uri | http://doi.org/10.1016/j.istr.2010.10.010 | - |
dc.identifier.uri | http://hdl.handle.net/11147/2784 | - |
dc.description.abstract | The increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing and assuring security requirements fall short of industrial and societal expectations. The statistics about vulnerabilities and attacks show that the security, reliability and availability objectives are not reached and that the general threat situation is getting worse. With the deployment of Next Generation Networks e NGNs, the complexity of networks, considering their architecture, speed and amount of connections, will increase exponentially. There are several proposals for the network and security architectures of NGNs, but current vulnerability, threat and risk analysis methods do not appear adequate to evaluate them. Appropriate analysis methods should have some additional new characteristics, mainly regarding their adaptation to the continuous evolution of the NGNs. In addition, the application of security countermeasures will require technological improvements, which will demand further security analyses. This paper evaluates the current vulnerability, threat and risk analysis methods from the point of view of the new security requirements of NGNs. Then, the paper proposes to use autonomic and self-adaptive systems/applications for assuring the security of NGNs. | en_US |
dc.description.sponsorship | TUBITAK (Turkish Science and Technological Research Program) under Grant of Bideb2219 Post-Doctorate Research Fellowship | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Ltd. | en_US |
dc.relation.ispartof | Information Security Technical Report | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Network security | en_US |
dc.subject | Next generation networks | en_US |
dc.subject | Internet | en_US |
dc.subject | Security | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | Threat | en_US |
dc.subject | Risk analysis | en_US |
dc.subject | Autonomic computing | en_US |
dc.subject | Self-adaptive systems | en_US |
dc.title | Challenges for the security analysis of next generation networks | en_US |
dc.type | Article | en_US |
dc.institutionauthor | Atay, Serap | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 16 | en_US |
dc.identifier.issue | 1 | en_US |
dc.identifier.startpage | 3 | en_US |
dc.identifier.endpage | 11 | en_US |
dc.identifier.scopus | 2-s2.0-80052800122 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1016/j.istr.2010.10.010 | - |
dc.relation.doi | 10.1016/j.istr.2010.10.010 | en_US |
dc.coverage.doi | 10.1016/j.istr.2010.10.010 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
9
checked on Nov 15, 2024
Page view(s)
6,058
checked on Nov 18, 2024
Download(s)
336
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.