Journal article

ASGARI Hamid, HAINES Sarah and RYŠAVÝ Ondřej. Identification of Threats and Security Risk Assessments for Recursive Internet Architecture. IEEE Systems Journal. 2018, vol. 2018, no. 12, pp. 2437-2448. ISSN 1937-9234. Available from: https://ieeexplore.ieee.org/document/8105791/
Publication language:english
Original title:Identification of Threats and Security Risk Assessments for Recursive Internet Architecture
Title (cs):Identifikace ohrožení a hodnocení bezpečnostních rizik pro architekturu RINA
Pages:2437-2448
Place:US
Year:2018
URL:https://ieeexplore.ieee.org/document/8105791/
Journal:IEEE Systems Journal, Vol. 2018, No. 12, US
ISSN:1937-9234
DOI:10.1109/JSYST.2017.2765178
Keywords
Security, Risk management, Network architecture, Computer architecture, Resilience, ISO Standards, Recursive Internet Architecture
Annotation
There are several types of attacks on communication networks such as disrupting or blocking communication, intercepting, injecting fabricated packets, accessing and modifying the information. Here, for the first time the SecRAM, a recent security risk assessment methodology, is proposed to be systematically applied in a different context, i.e., to the network systems, specifically to an emerging network architecture called recursive internetwork architecture (RINA). The security risk assessment is performed to: identify run-time threats; assess the impact and likelihood of occurrence of attacks relevant to the threats; evaluate the RINA design principles; and validate the built-in security enablers and the mitigation actions that are devised to combat such attacks. Resulting from this assessment, specific measures are proposed to further improve cyber resiliency of the RINA, in securing its layers and components. The enhancement prevails through the utilization of multilayered security controls or the increase in their strength. We show how programmable security controls can assist in tackling network attacks. For proof of concept, we demonstrate formal analysis of some of the security properties of RINA using ProVerif tool and RINA Simulator. We apply the tool to create a formal model of a network and mitigate the selected attacks. The results of this analysis are provided.
BibTeX:
@ARTICLE{
   author = {Hamid Asgari and Sarah Haines and Ond{\v{r}}ej
	Ry{\v{s}}av{\'{y}}},
   title = {Identification of Threats and Security Risk
	Assessments for Recursive Internet Architecture},
   pages = {2437--2448},
   journal = {IEEE Systems Journal},
   volume = 2018,
 number = 12,
   year = 2018,
   ISSN = {1937-9234},
   doi = {10.1109/JSYST.2017.2765178},
   language = {english},
   url = {http://www.fit.vutbr.cz/research/view_pub.php.en.iso-8859-2?id=11823}
}

Your IPv4 address: 3.81.28.94
Switch to https