Protecting services from security mis-configuration
Paper
Paper/Presentation Title | Protecting services from security mis-configuration |
---|---|
Presentation Type | Paper |
Authors | Hadaad, Nabeel (Author), Drury, Luke (Author) and Addie, Ronald G. (Author) |
Journal or Proceedings Title | Proceedings of the 25th International Telecommunication Networks and Applications Conference (ITNAC 2015) |
Number of Pages | 6 |
Year | 2015 |
Place of Publication | United States |
ISBN | 9781467393485 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/ATNAC.2015.7366799 |
Web Address (URL) of Paper | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7366799 |
Conference/Event | 25th International Telecommunication Networks and Applications Conference (ITNAC 2015) |
Event Details | 25th International Telecommunication Networks and Applications Conference (ITNAC 2015) Event Date 18 to end of 20 Nov 2015 Event Location Sydney, Australia |
Abstract | It is understood that ICT security can be defined and enforced through rules. In this paper, the concept of rules which define and ensure users’ access to services is introduced. Examples of how service is hindered by otherwise sensible security rules are presented. Service protection policies are then described which can help to prevent these compromises to service and assist us to measure this impact where it occurs. These examples include demonstration in some cases of how the combined collection of rules (security and service protection) can be enforced and maintained. The concept of service protection policies is introduced. We use ns3 and Click in simulations to check the consistency of aggregate security policy by checking that service protection rules are valid. We show that these can improve the performance of the network experienced by users and increase network security. |
ANZSRC Field of Research 2020 | 440212. Private policing and security services |
Public Notes | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Byline Affiliations | University of Misan, Iraq |
Information and Communication Technology Services | |
School of Agricultural, Computational and Environmental Sciences | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q3180/protecting-services-from-security-mis-configuration
1642
total views18
total downloads2
views this month0
downloads this month