Title: Challenges for the Security Analysis of Next Generation Networks
Authors: ATAY SerapMASERA Marcelo
Citation: Information Security Technical Report vol. 16 no. 1 p. 3-11
Publisher: Elsevier
Publication Year: 2011
JRC N°: JRC66738
ISSN: 1363-4127
URI: http://www.sciencedirect.com/science/journal/13634127
DOI: 10.1016/j.istr.2010.10.010
Type: Articles in periodicals and books
Abstract: The increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing and assuring security requirements fall short of industrial and societal expectations. The statistics about vulnerabilities and attacks show that the security, reliability and availability objectives are not reached and that the general threat situation is getting worse. With the deployment of Next Generation Networks – NGNs, the complexity of networks, considering their architecture, speed and amount of connections, will increase exponentially. There are several proposals for the network and security architectures of NGNs, but current vulnerability, threat and risk analysis methods do not appear adequate to evaluate them. Appropriate analysis methods should have some additional new characteristics, mainly regarding their adaptation to the continuous evolution of the NGNs. In addition, the application of security countermeasures will require technological improvements, which will demand further security analyses. This paper evaluates the current vulnerability, threat and risk analysis methods from the point of view of the new security requirements of NGNs. Then, the paper proposes to use autonomic and self-adaptive systems/applications for assuring the security of NGNs. Keywords: Network security; Next generation networks; Internet; Security; Vulnerability; Threat; Risk analysis; Autonomic computing; Self-adaptive systems
JRC Directorate:Energy, Transport and Climate

Files in This Item:
There are no files associated with this item.

Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.