Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/2784
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAtay, Serap-
dc.contributor.authorMasera, Marcelo-
dc.date.accessioned2017-01-13T11:50:53Z-
dc.date.available2017-01-13T11:50:53Z-
dc.date.issued2011-02-
dc.identifier.citationAtay, S., and Masera, M. (2011). Challenges for the security analysis of next generation networks. Information Security Technical Report, 16(1), 3-11. doi:10.1016/j.istr.2010.10.010en_US
dc.identifier.urihttp://doi.org/10.1016/j.istr.2010.10.010-
dc.identifier.urihttp://hdl.handle.net/11147/2784-
dc.description.abstractThe increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing and assuring security requirements fall short of industrial and societal expectations. The statistics about vulnerabilities and attacks show that the security, reliability and availability objectives are not reached and that the general threat situation is getting worse. With the deployment of Next Generation Networks e NGNs, the complexity of networks, considering their architecture, speed and amount of connections, will increase exponentially. There are several proposals for the network and security architectures of NGNs, but current vulnerability, threat and risk analysis methods do not appear adequate to evaluate them. Appropriate analysis methods should have some additional new characteristics, mainly regarding their adaptation to the continuous evolution of the NGNs. In addition, the application of security countermeasures will require technological improvements, which will demand further security analyses. This paper evaluates the current vulnerability, threat and risk analysis methods from the point of view of the new security requirements of NGNs. Then, the paper proposes to use autonomic and self-adaptive systems/applications for assuring the security of NGNs.en_US
dc.description.sponsorshipTUBITAK (Turkish Science and Technological Research Program) under Grant of Bideb2219 Post-Doctorate Research Fellowshipen_US
dc.language.isoenen_US
dc.publisherElsevier Ltd.en_US
dc.relation.ispartofInformation Security Technical Reporten_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectNetwork securityen_US
dc.subjectNext generation networksen_US
dc.subjectInterneten_US
dc.subjectSecurityen_US
dc.subjectVulnerabilityen_US
dc.subjectThreaten_US
dc.subjectRisk analysisen_US
dc.subjectAutonomic computingen_US
dc.subjectSelf-adaptive systemsen_US
dc.titleChallenges for the security analysis of next generation networksen_US
dc.typeArticleen_US
dc.institutionauthorAtay, Serap-
dc.departmentİzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.volume16en_US
dc.identifier.issue1en_US
dc.identifier.startpage3en_US
dc.identifier.endpage11en_US
dc.identifier.scopus2-s2.0-80052800122en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1016/j.istr.2010.10.010-
dc.relation.doi10.1016/j.istr.2010.10.010en_US
dc.coverage.doi10.1016/j.istr.2010.10.010en_US
dc.identifier.wosqualityN/A-
dc.identifier.scopusqualityN/A-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
crisitem.author.dept03.04. Department of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
2784.pdfMakale Dosyası1.11 MBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

9
checked on Nov 15, 2024

Page view(s)

6,058
checked on Nov 18, 2024

Download(s)

336
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.