REIMAGINING NETWORK SECURITY: A SERVICE-ORIENTED ARCHITECTURE FOR NEXT GENERATION SECURITY SYSTEMS

Main Article Content

Santosh Kumar Gayakwad

Abstract

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Kumar Gayakwad, S. . (2022). REIMAGINING NETWORK SECURITY: A SERVICE-ORIENTED ARCHITECTURE FOR NEXT GENERATION SECURITY SYSTEMS. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 13(1), 559–564. https://doi.org/10.61841/turcomat.v13i1.15273
Section
Articles

References

Eric Filiol. Strong cryptography armoured computer viruses forbidding code analysis: the bradley

virus. In EICAR2005, volume 14, 2005.

Gartner: Highlights key predictions for it organizations in 2007 and

beyond, 13.12.2006. http://www.gartner.com/it/page.jsp?id=499323.

Michael Hilker and Christoph Schommer. Sana - security analysis in internet traffic through artificial

immune systems. In Proceedings of the Trustworthy Software Workshop, Saarbruecken, Germany,

Eugene H. Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Comput.

Networks, 34(4):547– 570, 2000.

Peter Szor. The Art of Computer Virus Research and Defense. Addison-Wesley Professional, 2005.

Filiol, E. (2005). Strong cryptography armoured computer viruses forbidding code analysis: the

Bradley virus. EICAR, 14.

Gartner (2006). Highlights key predictions for IT organizations in 2007 and beyond. [Online]

Available at: http://www.gartner.com/it/page.jsp?id=499323

Hilker, M., & Schommer, C. (2006). SANA - Security Analysis in Internet Traffic through Artificial

Immune Systems. Trustworthy Software Workshop, Saarbruecken, Germany.

Spafford, E. H., & Zamboni, D. (2000). Intrusion detection using autonomous agents. Computer

Networks, 34(4), 547–570.

Szor, P. (2005). The Art of Computer Virus Research and Defense. Addison-Wesley Professional.

Szor, P., & Ferrie, P. (2001). Hunting for metamorphic. In Virus Bulletin Conference.

Garfinkel, T., & Rosenblum, M. (2003). A virtual machine introspection based architecture for

intrusion detection. Network and Distributed System Security Symposium.

Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM

conference on Computer and communications security.

Smith, J. M., & Nair, R. (2005). The architecture of virtual machines. Computer, 38(5), 32-38.

Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering,

SE-13(2), 222–232.

Peter Szor and Peter Ferrie. Hunting for metamorphic. In Virus Bulletin Conference and Symantec

White Paper, 2001.