How to Exchange Security Events? Overview and Evaluation of Formats and Protocols

被引:0
|
作者
Steinberger, Jessica [1 ,3 ]
Sperotto, Anna [3 ]
Golling, Mario [2 ]
Baier, Harald [1 ]
机构
[1] Univ Appl Sci Darmstadt, Da Sec Biometr & Internet Secur Res Grp, Darmstadt, Germany
[2] Univ Bundeswehr Munchen, Fac Comp Sci, Res Ctr CODE, Neubiberg, Germany
[3] Univ Twente, DACS, Enschede, Netherlands
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the occurrence of anomalous events as a proactive service. In this paper we provide a structured overview of existing exchange formats and protocols. We evaluate and compare the exchange formats and protocols in context of high-speed networks. In particular, we focus on flow data. In addition, we investigate the exchange of potentially sensitive data. For our overview, we review different exchange formats and protocols with respect to their use-case scenario, their interoperability with network flow-based data, their scalability in a high-speed network context and develop a classification.
引用
收藏
页码:261 / 269
页数:9
相关论文
共 50 条
  • [1] Logic of Events for Proving Security Properties of Protocols
    Xiao, Meihua
    Bickford, Mark
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 519 - +
  • [2] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [3] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [4] Critical Evaluation of RFID Security Protocols
    Zavvari, Azam
    Patel, Ahmed
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2012, 6 (03) : 56 - 74
  • [5] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [6] ON THE IMPORTANCE OF MEMORY RESOURCES IN THE SECURITY OF KEY EXCHANGE PROTOCOLS
    DAVIDA, G
    DESMEDT, Y
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 11 - 15
  • [7] Analyzing the security flaws of internet key exchange protocols
    Zhang, Yong
    Feng, Dong-Lei
    Chen, Han-Sheng
    Bai, Ying-Cai
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
  • [8] Security of Group Key Exchange Protocols with Different Passwords
    Phan, Raphael C. -W.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
  • [9] A Brief Overview on Security Challenges and Protocols in Internet of Things Application
    Savithri, Gajjala
    Mohanta, Bhabendu Kumar
    Dehury, Mohan Kumar
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 463 - 469
  • [10] How to Formally Model Features of Network Security Protocols
    Lee, Gyesik
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 423 - 431