期刊文献+

Security-State Adjustable Gateway with Threat-Based Configuration

Security-State Adjustable Gateway with Threat-Based Configuration
下载PDF
导出
摘要 This paper proposes a configurable secure gateway architecture which allows the system administrators to dynamically configure the security mechanisms upon deployment or during the run-time. Rather than allowing the system administrators to turn on or off individual security mechanisms, the proposed architecture allows the administrators to configure the gateway based on the security threats to be overcome. The current common architecture leads to tremendous administration overhead and increases the chance of misconfiguration vulnerability. We propose a novel software architecture to aid the product designers to avoid the misconfiguration vulnerability and the end-users to ease the administration overhead. The software architecture makes use of the threats to the gateways and the occurrence relation between the threats to configure the security software components on the gateways. With the software architecture, the end-users can focus on determining the desired security features rather than the software configuration. Moreover, the architecture allows the product designers or security service to incrementally revise the software configuration when new threats appear. This paper proposes a configurable secure gateway architecture which allows the system administrators to dynamically configure the security mechanisms upon deployment or during the run-time. Rather than allowing the system administrators to turn on or off individual security mechanisms, the proposed architecture allows the administrators to configure the gateway based on the security threats to be overcome. The current common architecture leads to tremendous administration overhead and increases the chance of misconfiguration vulnerability. We propose a novel software architecture to aid the product designers to avoid the misconfiguration vulnerability and the end-users to ease the administration overhead. The software architecture makes use of the threats to the gateways and the occurrence relation between the threats to configure the security software components on the gateways. With the software architecture, the end-users can focus on determining the desired security features rather than the software configuration. Moreover, the architecture allows the product designers or security service to incrementally revise the software configuration when new threats appear.
出处 《Journal of Electronic Science and Technology》 CAS 2013年第2期140-149,共10页 电子科技学刊(英文版)
基金 supported by National Science Council under Grant No. NSC 101-2218-E-025-001, NSC 100-2221-E-390-012, and NSC 101-2221-E-390-007
关键词 Common criteria GATEWAY operationsystem SECURITY THREAT Common criteria gateway operationsystem security threat
  • 相关文献

参考文献28

  • 1F. Gens. New IDC IT cloud services survey: Top benefits and challenges. [Online]. Available: http://blogs.idc.coml iel?p=730.
  • 2Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance, 2012.
  • 3M. Pan, P. Li, X. Song, Y. Fang, .and P. Lin, "Spectrum clouds: a session. based spectrum trading system for multi-hop cognitive radio networks," in Prof of Int. Calif. Computer Communications, Orlando, 2012, pp. 1557-1565.
  • 4B. Schneier, "Attack trees," Dr Dobbs Journal, vol. 24, no. 12, pp. 21-19, Dec. 1999.
  • 5R. Braden and J. Postel, RFC 1009 (Requirements for Internet gateways), 1987.
  • 6Y. Wu, Y. Suhendra, and H. Guo, "A gateway-based access control scheme for collaborative clouds," in Prof of the 7th Int. Calif. on Internet Monitoring and Protection, Stuttgart, 2012, pp. 54-60.
  • 7Common criteria for information technology security evaluation. [Online]. Available: http://www. commoncriteriaportal.org/cc/.
  • 8K. V. Dolan, P. A. Wright, and R. R. Montequin. U.S. Department Defense application-level firewall protection profile for medium robustness environments, version 1.0. Technical Report. [Online]. Available: http://oai.dtic.miVoai/oai?verb=getRecord&metadataPrefix= htrnl&identifier=ADA395046.
  • 9K. V. Dolan, P. A. Wright, and R. R. Montequin, B. Mayer, L. Gilmore, and C. Hall. U.S. government traffic-filter firewall protection profile for medium robustness environments. Technical Report. Available: http://www.dtic.miVdtic/tr/fulltextlu2/a395046.pdf.
  • 10National Security Agency. Protection profile for single-level operating systems in environments requiring medium robustness, version 1.22. Technical Report. [Online]. Available: http://www.niap-ccevs.org/pp/ pp_os_sl_mr_ v1.22.pdf.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部