REIMAGINING NETWORK SECURITY: A SERVICE-ORIENTED ARCHITECTURE FOR NEXT GENERATION SECURITY SYSTEMS
Main Article Content
Abstract
Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed
Downloads
Metrics
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Eric Filiol. Strong cryptography armoured computer viruses forbidding code analysis: the bradley
virus. In EICAR2005, volume 14, 2005.
Gartner: Highlights key predictions for it organizations in 2007 and
beyond, 13.12.2006. http://www.gartner.com/it/page.jsp?id=499323.
Michael Hilker and Christoph Schommer. Sana - security analysis in internet traffic through artificial
immune systems. In Proceedings of the Trustworthy Software Workshop, Saarbruecken, Germany,
Eugene H. Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Comput.
Networks, 34(4):547– 570, 2000.
Peter Szor. The Art of Computer Virus Research and Defense. Addison-Wesley Professional, 2005.
Filiol, E. (2005). Strong cryptography armoured computer viruses forbidding code analysis: the
Bradley virus. EICAR, 14.
Gartner (2006). Highlights key predictions for IT organizations in 2007 and beyond. [Online]
Available at: http://www.gartner.com/it/page.jsp?id=499323
Hilker, M., & Schommer, C. (2006). SANA - Security Analysis in Internet Traffic through Artificial
Immune Systems. Trustworthy Software Workshop, Saarbruecken, Germany.
Spafford, E. H., & Zamboni, D. (2000). Intrusion detection using autonomous agents. Computer
Networks, 34(4), 547–570.
Szor, P. (2005). The Art of Computer Virus Research and Defense. Addison-Wesley Professional.
Szor, P., & Ferrie, P. (2001). Hunting for metamorphic. In Virus Bulletin Conference.
Garfinkel, T., & Rosenblum, M. (2003). A virtual machine introspection based architecture for
intrusion detection. Network and Distributed System Security Symposium.
Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM
conference on Computer and communications security.
Smith, J. M., & Nair, R. (2005). The architecture of virtual machines. Computer, 38(5), 32-38.
Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering,
SE-13(2), 222–232.
Peter Szor and Peter Ferrie. Hunting for metamorphic. In Virus Bulletin Conference and Symantec
White Paper, 2001.