Review of Research on Security Monitoring Index System of Open Source Software

Author(s):  
Jing Zou ◽  
Qiuzhe Ma ◽  
Yuhang Zhao ◽  
Ruigang Liang ◽  
Renjie Su ◽  
...  
2018 ◽  
Vol 1 (2) ◽  
pp. 41-51
Author(s):  
Mohammed A. Al-Qassim ◽  
Emad H. Al-Hemiary

network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.


Author(s):  
Passakorn PHANNACHITTA ◽  
Akinori IHARA ◽  
Pijak JIRAPIWONG ◽  
Masao OHIRA ◽  
Ken-ichi MATSUMOTO

Author(s):  
Christina Dunbar-Hester

Hacking, as a mode of technical and cultural production, is commonly celebrated for its extraordinary freedoms of creation and circulation. Yet surprisingly few women participate in it: rates of involvement by technologically skilled women are drastically lower in hacking communities than in industry and academia. This book investigates the activists engaged in free and open-source software to understand why, despite their efforts, they fail to achieve the diversity that their ideals support. The book shows that within this well-meaning volunteer world, beyond the sway of human resource departments and equal opportunity legislation, members of underrepresented groups face unique challenges. The book explores who participates in voluntaristic technology cultures, to what ends, and with what consequences. Digging deep into the fundamental assumptions underpinning STEM-oriented societies, the book demonstrates that while the preferred solutions of tech enthusiasts—their “hacks” of projects and cultures—can ameliorate some of the “bugs” within their own communities, these methods come up short for issues of unequal social and economic power. Distributing “diversity” in technical production is not equal to generating justice. The book reframes questions of diversity advocacy to consider what interventions might appropriately broaden inclusion and participation in the hacking world and beyond.


2015 ◽  
Vol 4 (1) ◽  
pp. 1224-1228 ◽  
Author(s):  
Debasish Chakraborty ◽  
◽  
Debanjan Sarkar ◽  
Shubham Agarwal ◽  
Dibyendu Dutta ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document