network security research paper-21

Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security
C Wright, C Connelly, T Braje, J Rabek ,Recent Advances in , 2010 ,Springer
Rigorous scientific experimentation in system and network security remains an elusive goal.
Recent work has outlined three basic requirements for experiments, namely that hypotheses
must be falsifiable, experiments must be controllable, and experiments must be 

Let the pirates patch? an economic analysis of network software security patch restrictions
T August ,Workshop on Information Systems and , 2006 ,
Piracy has long been an important concern for the software industry. The relative ease of
reproducing and distributing software, as with any digital good, combined with the high
value that many software products command makes software a prime target for piracy and 

Security in programmable network infrastructures: the integration of network and application solutions
P Bellavista, A Corradi, R Montanari ,Active Networks, 2000 ,Springer
Programming the network infrastructure significantly enhances its flexibility and favors fast
deployment of new protocols, but also introduces serious security risks. It is crucial to protect
the whole distributed infrastructure, especially its availability in case of denial-of-service 

Virtual terrain: a security-based representation of a computer network
J Holsopple, S Yang ,Proceedings of SPIE, the , 2008 ,
ABSTRACT Much research has been put forth towards detection, correlating, and prediction
of cyber attacks in recent years. As this set of research progresses, there is an increasing
need for contextual information of a computer network to provide an accurate situational 

Real time fleet monitoring and security system using GSM network
M Ahmad, J Iqbal, S Ghazal ,WSEAS Transactions on , 2006 ,
Abstract:-Automobile tracking in the private and defense sector has required a vast amount
of research and development. This paper presents the two-way multiple vehicles tracking
system using GSM network and satellite communication. The multi-vehicle tracking system 

An intelligent agent-oriented system for integrating network security devices and handling large amount of security events
Y Ma, Z Li, J Lei, L Wang ,Intelligence and Security Informatics, 2007 ,Springer
To integrate network security devices to make them act as a battle team and efficiently
handle the large amount of security events produced by various network applications,
Network Security Intelligent Centralized Management is a basic solution. In this paper, we 

ITU-T X. 805 based vulnerability analysis method for security framework of end-to-end networkservices
Y Cho, Y Won ,WSEAS Transactions on Communications, 2006 ,
Abstract:-This paper proposes a ITU-T X. 805 based Vulnerability Analysis Method for
developing Security Framework of NGN infrastructure and services. It is derived from ITU-T
X. 805 and security consulting methods. It provides a holistic approach and a systematic 

Network Security Management for a National ISP
R Deepak, HA Murthy ,IIT Madras, December, 2004 ,
Abstract A network is one of the most important basic resources a large institution
(educational or commercial) needs to have. Today, networks play a very important role in
every organization. With widespread distributed deployment, managing the security of a 

Network Security for the Broadband Era
M Kayashima, Y Nagai ,Hitachi Review, 2002 ,
BROADBAND networks are beginning to carry information of high asset value, such as
multimedia contents. Consequently, the risks of virus attack or illegal access have been
increasing. Thus, broadband networks are in need of improved information security.“

The Concept of Trust in Network Security
I Curry ,Entrust technologies, Dec, 1995 ,
Every security system depends on trust, in one form or another, among users of the system.
In general, different forms of trust exist to address different types of problems and mitigate
risk in certain conditions. Which form of trust to apply in a given circumstance is generally 

Network traffic analysis and SCADA security
Communication Security, 2010 ,Springer
The problem of monitoring and characterizing network traffic arises in the context of a variety
of network management functions. For example, consider the five functions defined in the
OSI Network Management Framework [20.1], ie, configuration management, performance 

Attack Graph Generation with Implementation in Network Security
TAO ZHANG, HU MING-ZENG ,Proceeding of WESEAS , 2007 ,
Abstract:-As an important method to analyze the security states of computer network, the
generation of network attack graph is a hot topic in this domain. After analyzing network
vulnerabilities, linking relation between devices and the characteristic of attack, the model 

Network Security: An Open-Source Approach
BR Jones ,2005 ,
Abstract—This paper attempts to introduce the reader to the Network Security Monitoring
(NSM) model and the availability of robust open-source network security utilities to achieve a
defensible network. To achieve a secure network, the analyst must fully implement all 

The OSCE, NATO and EU within the ‘network of interlocking European Security Institutions
I Peters , on the Organization for Security and Co-operation in , 2004 ,
The risks and challenges we face today cannot be met by a single State or organization.
Over the last decade, we have taken important steps to forge new co-operation between the
OSCE and other international organizations. In order to make full use of the resources of 

An Analysis on Bandwidth Utilization and Traffic Pattern for Network Security Management
M Kassim , Science and Information Technology, www. ipcsit , 2011 ,
Abstract. This paper presented an analysis on network bandwidth utilizations and traffic
pattern in an organization. It presents pattern of network traffic used of bandwidth utilization
and network trends properties. Internet traffics are analyzed and the traffic pattern 

Fragility of the robust security network: 802.11 denial of service
M Eian ,Applied Cryptography and Network Security, 2009 ,Springer
The upcoming 802.11 w amendment to the 802.11 standard eliminates the 802.11
deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper
presents two other DoS vulnerabilities: one vulnerability in draft 802.11 w implementations 

On A Network Forensics Model For Information Security
R Wei ,ISTA, 2004 ,
Abstract: The employment of a patchwork of nonintegrated security products can only
provide incomplete coverage, which cannot give the total panorama of the network misuse
behavior. Network forensics is a new approach for the incident investigation and 

A Survey of P2P Network Security Issues Based on Protocol Stack
Z Dehua ,Progress on Cryptography, 2004 ,Springer
People pay more attention to the security issues of the P2P Network, and propose previous
error not mod different secure settlements to different applications. In this paper, we begin
with studying the features of P2P Network, analyze the secure issues of the P2P Network, 

Five Non-Technical Pillars of Network Information Security Management
E Kritzinger ,Communications and Multimedia Security, 2005 ,Springer
Securing information is vital for the survival of many organizations. Therefore, information
must be proactively secured against harmful attacks. This securing of information becomes
more complex when such information is transmitted over networks. This paper identifies 

Approach to Auditing Network Security
SA Sayana ,Information Systems Control Journal, 2003 ,
Today we live in a connected world. Communication is a key requirement for all systems.
Increased integration of systems requires a compulsive need to establish fast and reliable
communication that is as widespread as the organization and its business dealings. 

SLEDE: event-based specification of sensor network security protocols
Y Hanna ,ACM SIGSOFT Software Engineering Notes, 2006 ,
ABSTRACT The semantic gap between specification and implementation languages for
sensor networks security protocols impedes the specification and verification of the
protocols. In this work, we present SLEDE, an event-based specification language and its 

J Perez ,Texas A&M University–Corpus Christi ,
ABSTRACT Today, the majority of wireless networks hold some form of sensitive data that
only authorized users are meant to access. As a result, communication networks must
enforce some type of security protocols that will limit the users who have access to the 

- -