ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jin S. Yang, Young J. Han, Dong S. Kim, Beom H. Chang, Tai M. Chung, Jung C. Na
Issue Date
2004-05
Citation
International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.693-700
Publisher
Springer
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-540-24707-4_81
Abstract
Active networks support infrastructure that the routers or switches of the network perform customized computations on the messages flowing through them. For the active networking, it is necessary to build the new components: NodeOS (Node Operation System), Execution Environment (EE), Active Application (AA). The addition of the new components occurs potentially security vulnerability. Although studies have been made existing components from external threat in active network environments, taxonomy of security vulnerability of active network components has never been studied so far. Therefore, there is no criterion for these vulnerabilities in active network environments. In this paper, we analyze active network components for vulnerability scanning and classify vulnerabilities based on active network components. This taxonomy presents the criterion of security vulnerabilities in active network environments. © Springer-Verlag 2004.
KSP Keywords
Active application, Active networking, Execution environment, Security vulnerabilities, Vulnerability Scanning, fine-grained, operation system