{"title":"无线存储区域网络中基于事务应用的入侵标记","authors":"S. Chatti, Habib Ounelli","doi":"10.1109/NBiS.2013.91","DOIUrl":null,"url":null,"abstract":"Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be exploited by the intruder in order to cause damage to network resources. The integration of transaction-based applications in these environment introduces an additional set of threats that may prevent the correct processing in the wireless storage area network (WSAN) environment. In this context, we propose a marking intrusion for WSAN environment.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Marking Intrusion of Transaction-Based Applications in Wireless Storage Area Network\",\"authors\":\"S. Chatti, Habib Ounelli\",\"doi\":\"10.1109/NBiS.2013.91\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be exploited by the intruder in order to cause damage to network resources. The integration of transaction-based applications in these environment introduces an additional set of threats that may prevent the correct processing in the wireless storage area network (WSAN) environment. In this context, we propose a marking intrusion for WSAN environment.\",\"PeriodicalId\":261268,\"journal\":{\"name\":\"2013 16th International Conference on Network-Based Information Systems\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 16th International Conference on Network-Based Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NBiS.2013.91\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 16th International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2013.91","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Marking Intrusion of Transaction-Based Applications in Wireless Storage Area Network
Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be exploited by the intruder in order to cause damage to network resources. The integration of transaction-based applications in these environment introduces an additional set of threats that may prevent the correct processing in the wireless storage area network (WSAN) environment. In this context, we propose a marking intrusion for WSAN environment.