A fine-grained taxonomy of security vulnerability in active network environments

N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Active networks support infrastructure that the routers or switches of the network perform customized computations on the messages flowing through them. For the active networking, it is necessary to build the new components: NodeOS (Node Operation System), Execution Environment (EE), Active Application (AA). The addition of the new components occurs potentially security vulnerability. Although studies have been made existing components from external threat in active network environments, taxonomy of security vulnerability of active network components has never been studied so far. Therefore, there is no criterion for these vulnerabilities in active network environments. In this paper, we analyze active network components for vulnerability scanning and classify vulnerabilities based on active network components. This taxonomy presents the criterion of security vulnerabilities in active network environments. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Yang, J. S., Han, Y. J., Kim, D. S., Chang, B. H., Chung, T. M., & Na, J. C. (2004). A fine-grained taxonomy of security vulnerability in active network environments. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3046 LNCS(PART 4), 681–688. https://doi.org/10.1007/978-3-540-24768-5_73

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free