Distributed Packet Trace Processing Method for Information Security Analysis

Author(s):  
Alexey Lukashin ◽  
Leonid Laboshin ◽  
Vladimir Zaborovsky ◽  
Vladimir Mulukha
2015 ◽  
Vol 8 (25) ◽  
Author(s):  
Joon Tae Ahn ◽  
Soonsuk Kim ◽  
Junghan Lee ◽  
Myung Gon Kim ◽  
Gil Hong Park ◽  
...  

Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


2021 ◽  
Vol 7 ◽  
pp. e362
Author(s):  
Jinghua Yu ◽  
Stefan Wagner ◽  
Feng Luo

Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework.


2020 ◽  
Vol 39 (6) ◽  
pp. 8633-8642
Author(s):  
Zhu, Hongwei ◽  
Wang, Xuesong

With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19.


2017 ◽  
Vol 887 ◽  
pp. 012090
Author(s):  
Ying Jiang ◽  
Yize Tang ◽  
Wenda Lu ◽  
Zhongfeng Wang ◽  
Zepeng Wang ◽  
...  

2014 ◽  
Vol 989-994 ◽  
pp. 4823-4826
Author(s):  
Xue Yuan Zhang ◽  
Hua Zhen Ji ◽  
Min Li

In order to enrich the mobile police application and enhancing mobile police application security,analysis of current situation and requirement of the mobile police application,to put forward a kind of police mobile application store system based on information safety technology.Specific depicts system overall design,background design,front design,the use of information security technology,and the test results of the system are described.The design and development of the police mobile application warehouse system,have certain reference siginficance.


Sign in / Sign up

Export Citation Format

Share Document