How to Exchange Security Events? Overview and Evaluation of Formats and Protocols

被引:0
|
作者
Steinberger, Jessica [1 ,3 ]
Sperotto, Anna [3 ]
Golling, Mario [2 ]
Baier, Harald [1 ]
机构
[1] Univ Appl Sci Darmstadt, Da Sec Biometr & Internet Secur Res Grp, Darmstadt, Germany
[2] Univ Bundeswehr Munchen, Fac Comp Sci, Res Ctr CODE, Neubiberg, Germany
[3] Univ Twente, DACS, Enschede, Netherlands
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the occurrence of anomalous events as a proactive service. In this paper we provide a structured overview of existing exchange formats and protocols. We evaluate and compare the exchange formats and protocols in context of high-speed networks. In particular, we focus on flow data. In addition, we investigate the exchange of potentially sensitive data. For our overview, we review different exchange formats and protocols with respect to their use-case scenario, their interoperability with network flow-based data, their scalability in a high-speed network context and develop a classification.
引用
收藏
页码:261 / 269
页数:9
相关论文
共 50 条
  • [21] Security model and modular design of fair authentication key exchange protocols
    DengGuo Feng
    WeiDong Chen
    Science China Information Sciences, 2010, 53 : 278 - 287
  • [22] A Security Evaluation of Popular Internet of Things Protocols for Manufacturers
    Celebucki, Daniel
    Lin, Maj Alan
    Graham, Scott
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [23] Security model and modular design of fair authentication key exchange protocols
    FENG DengGuo & CHEN WeiDong State Key Laboratory of Information Security
    ScienceChina(InformationSciences), 2010, 53 (02) : 278 - 287
  • [24] Modeling advanced security aspects of key exchange and secure channel protocols
    Gunther, Felix
    IT-INFORMATION TECHNOLOGY, 2020, 62 (5-6): : 287 - 293
  • [25] On security models and compilers for group key exchange protocols (Extended abstract)
    Bresson, Emmanuel
    Manulis, Mark
    Schwenk, Joerg
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 292 - +
  • [26] Security model and modular design of fair authentication key exchange protocols
    Feng DengGuo
    Chen WeiDong
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (02) : 278 - 287
  • [27] Overview security analysis of 3G authentication protocols and technical specifications
    Cao, Chenlei
    Zhang, Ru
    Niu, Xinxin
    Zhou, Linna
    Zhang, Zhentao
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
  • [28] Sustainability in Business Events: How Hybrid Formats Shape Attendee Decision-Making
    Santos, Jose Antonio C.
    Gamez, Manuel angel Fernandez
    Puig-Cabrera, Miguel
    Santos, Margarida Custodio
    JOURNAL OF TOURISM AND SERVICES, 2024, 15 (29): : 320 - 348
  • [29] An Overview of Evaluation Metrics for Routing Protocols in Wireless Sensor Networks
    Khan, Wazir Zada
    Saad, N. M.
    Aalsalem, Mohammed Y.
    2012 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT AND ADVANCED SYSTEMS (ICIAS), VOLS 1-2, 2012, : 588 - 593
  • [30] How Many FIDO Protocols Are Needed? Analysing the Technology, Security, and Compliance
    Angelogianni, Anna
    Politis, Ilias
    Xenakis, Christos
    ACM COMPUTING SURVEYS, 2024, 56 (08)