loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Michał Chorás 1 ; Salvatore d’Antonio 2 ; Rafał Kozik 3 and Witold Hołubowicz 4

Affiliations: 1 ITTI Ltd.; Institute of Telecommunications, University of Technology & Life Sciences, Poland ; 2 Consorzio Interuniversitario Nazionale per l’Informatica CINI, Italy ; 3 Institute of Telecommunications, University of Technology & Life Sciences, Poland ; 4 Adam Mickiewicz University, Poland

ISBN: 978-989-674-025-2

Keyword(s): Network security, Heterogeneous network, Vulnerability database, Ontology management, INTERSECTION.

Related Ontology Subjects/Areas/Topics: Biomedical Engineering ; Data Engineering ; Databases and Datawarehouses ; Enterprise Information Systems ; Health Information Systems ; Information Systems Analysis and Specification ; Internet Technology ; Knowledge Management ; Ontologies and the Semantic Web ; Ontology and the Semantic Web ; Society, e-Business and e-Government ; Web Information Systems and Technologies ; Web Interfaces and Applications ; Web Security and Privacy ; XML and Data Management

Abstract: In this paper our approach to heterogeneous networks vulnerability handling is presented. Vulnerabilities of heterogeneous networks like satellite, GSM/GPRS, UMTS, wireless sensor networks and the Internet have been identified, classified and described in the framework of the European co-funded project, named INTERSECTION (INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks). Since computer security incidents usually occur across administrative domains and interconnected networks it is quite clear that it would be advantageous for different organizations and network operators to be able to share data on network vulnerabilities. The exchange of vulnerability information and statistics would be crucial for proactive identification of trends that can lead to incident prevention. Network operators have always been reticent to disclose information about attacks on their systems or through their networks. However, this tendency seems to be overcome by the new awareness that it is only through cooperation that networking infrastructures can be made robust to attacks and failures. Starting from these considerations, we developed two components, namely INTERSECTION Vulnerability Database (IVD) and Project INTERSECTION Vulnerability Ontology Tool (PIVOT), for vulnerability data management and classification. Both tools will be presented in this paper. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.161.118.57

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chorás M.; d’Antonio S.; Kozik R.; Hołubowicz W. and (2010). INTERSECTION APPROACH TO VULNERABILITY HANDLING.In Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 1: WEBIST, ISBN 978-989-674-025-2, pages 171-174. DOI: 10.5220/0002790601710174

@conference{webist10,
author={Michał Chorás and Salvatore d’Antonio and Rafał Kozik and Witold Hołubowicz},
title={INTERSECTION APPROACH TO VULNERABILITY HANDLING},
booktitle={Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 1: WEBIST,},
year={2010},
pages={171-174},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002790601710174},
isbn={978-989-674-025-2},
}

TY - CONF

JO - Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 1: WEBIST,
TI - INTERSECTION APPROACH TO VULNERABILITY HANDLING
SN - 978-989-674-025-2
AU - Chorás, M.
AU - d’Antonio, S.
AU - Kozik, R.
AU - Hołubowicz, W.
PY - 2010
SP - 171
EP - 174
DO - 10.5220/0002790601710174

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.