用于评估企业规模网络和运行条件下的网络安全方法的研究设施

S. Neville
{"title":"用于评估企业规模网络和运行条件下的网络安全方法的研究设施","authors":"S. Neville","doi":"10.1109/PACRIM.2005.1517327","DOIUrl":null,"url":null,"abstract":"The increased reliance on IT technologies has given rise to an increased risks relative to malicious cyber-security events. Research into the operational testing of cyber-security solutions, particularly within large-scale high bandwidth network environments, has not kept pace with the development of new security approaches and ever increasing network speeds. Current testing methods are generally limited to: (a) experiments conducted on small-scale research networks, (b) experiments conducted on pre-recorded network data or (c) active deployments on operational large scale networks. In the each case, issues exist either in the representativeness of the test environments to real world situations or the scientific repeatability of the experiments or both. A particularly complex issue is the sensitivity of reported results to background (normal) traffic characteristics existing at the time of experimentation. This work, presents the architecture of a cyber-security test facility under development designed address these issues.","PeriodicalId":346880,"journal":{"name":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A research facility for evaluating cyber-security approaches within corporate-scale networks and under operational conditions\",\"authors\":\"S. Neville\",\"doi\":\"10.1109/PACRIM.2005.1517327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increased reliance on IT technologies has given rise to an increased risks relative to malicious cyber-security events. Research into the operational testing of cyber-security solutions, particularly within large-scale high bandwidth network environments, has not kept pace with the development of new security approaches and ever increasing network speeds. Current testing methods are generally limited to: (a) experiments conducted on small-scale research networks, (b) experiments conducted on pre-recorded network data or (c) active deployments on operational large scale networks. In the each case, issues exist either in the representativeness of the test environments to real world situations or the scientific repeatability of the experiments or both. A particularly complex issue is the sensitivity of reported results to background (normal) traffic characteristics existing at the time of experimentation. This work, presents the architecture of a cyber-security test facility under development designed address these issues.\",\"PeriodicalId\":346880,\"journal\":{\"name\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PACRIM.2005.1517327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM.2005.1517327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

对信息技术的依赖程度的提高导致了恶意网络安全事件的风险增加。对网络安全解决方案的操作测试的研究,特别是在大规模高带宽网络环境中,没有跟上新的安全方法的发展和不断提高的网络速度。目前的测试方法一般限于:(a)在小规模研究网络上进行的实验,(b)在预先记录的网络数据上进行的实验,或(c)在可操作的大规模网络上进行的主动部署。在每种情况下,问题要么存在于测试环境对现实世界情况的代表性,要么存在于实验的科学可重复性,或者两者兼而有之。一个特别复杂的问题是报告结果对实验时存在的背景(正常)交通特征的敏感性。这项工作,提出了一个正在开发的网络安全测试设施的架构,旨在解决这些问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A research facility for evaluating cyber-security approaches within corporate-scale networks and under operational conditions
The increased reliance on IT technologies has given rise to an increased risks relative to malicious cyber-security events. Research into the operational testing of cyber-security solutions, particularly within large-scale high bandwidth network environments, has not kept pace with the development of new security approaches and ever increasing network speeds. Current testing methods are generally limited to: (a) experiments conducted on small-scale research networks, (b) experiments conducted on pre-recorded network data or (c) active deployments on operational large scale networks. In the each case, issues exist either in the representativeness of the test environments to real world situations or the scientific repeatability of the experiments or both. A particularly complex issue is the sensitivity of reported results to background (normal) traffic characteristics existing at the time of experimentation. This work, presents the architecture of a cyber-security test facility under development designed address these issues.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信