Real-time Risk Analysis on the Internet
暂无分享,去创建一个
In current times, sending confidential data over the Internet is becoming more commonplace every day. The process of sending confidential data over the Internet is, however, concomitant with great effort: encryption algorithms have to be incorporated and encryption key management and distribution have to take place. Wouldn’t it be easier, more secure and faster if only technology could be introduced to do risk analysis in real time? The objective of doing risk analysis in real time is to find a method through which dynamically to determine the vulnerability of, for example, a TCP/IP packet in terms of generic threat categories such as interception and fabrication. Once the vulnerability of the packet has been determined, the appropriate countermeasures can be activated to secure the packet before it is sent off to its original destination. The countermeasures are activated according to certain data that is found in and extracted from the TCP/IP packets. In order to be able to obtain this data, each TCP/IP packet flowing through a certain point in a network is intercepted and analysed.
[1] Jan H. P. Eloff,et al. The use of real-time risk analysis to enable dynamic activation of countermeasures , 1998, Comput. Secur..
[2] Douglas E. Comer. Computer networks and lnternets , 1996 .
[3] Jan H. P. Eloff,et al. Risk analysis modelling with the use of fuzzy logic , 1996, Comput. Secur..