Skip to main content

Adaptive Approach to Network Security

  • Conference paper
Computer Networks (CN 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 39))

Included in the following conference series:

Abstract

The security of information exchange between the parts in the teleinformatic infrastructure is one of the crucial topics. During the protecting the infrastructure of the organization, one can use a lot of mechanisms which are often based on the cryptographic primitives. Traditionally, the security officers model the protection system to be as strong as it is possible. However, the level of protection of information is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of the whole system, the excessive protection decreases its reliability and availability and, as a result, its global security. The appropriate security level can be estimated by means of different quality of protection models. In this paper we are going to present the approach how to introduce the adaptability to the network. We are basing on the adaptable security model for dynamic environment which calculates the protection level by means of the risk management processes. The analysis is assisted by the security management tool (SPOT) which visualizes and optimizes the adaptable model mentioned above. Finally, we present the case study introducing the network adaptability of the cryptographic protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Merabti, M., Shi, Q., Oppliger, R.: Advanced security techniques for network protection. Computer Communications 23, 151–158 (2000)

    Article  Google Scholar 

  2. Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common pki-based security policy. Computer Communication 26, 1873–1883 (2003)

    Article  Google Scholar 

  3. Lindskog, S.: Modeling and Tuning Security from a Quality of Service Perspective. PhD dissertation, Department of Computer Science and Engineering, Chalmers University of Technology, Gteborg, Sweden (2005)

    Google Scholar 

  4. Schneck, P., Schwan, K.: Authenticast: An Adaptive Protocol for High-Performance. Secure Network Applications, Technical Report GIT-CC-97-22 (1997)

    Google Scholar 

  5. Ong, C., Nahrstedt, K., Yuan, W.: Quality of protection for mobile applications. In: IEEE International Conference on Multimedia & Expo. (2003)

    Google Scholar 

  6. Sun, Y., Kumar, A.: Quality od protection(qop): A quantitative methodology to grade security services. In: 28th confrence on Distributed Computing Systems Workshop, pp. 394–399 (2008)

    Google Scholar 

  7. Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security 26(3), 246–255 (2007)

    Article  Google Scholar 

  8. Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: SPOT: Optimization tool for the adaptable security mechanism for dynamic environments (submitted to the publication, 2009)

    Google Scholar 

  9. Gerber, M., Solms, R.: Management of risk in the information age. Computers & Security 14, 16–30 (2005)

    Article  Google Scholar 

  10. Ksiezopolski, B., Kotulski, Z.: On a probability modeling of incidence occurrence in electronic processes. In: 7th NATO Regional Conference nn military communications and information systems, pp. 297–305 (2005)

    Google Scholar 

  11. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246, IETF (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ksiezopolski, B., Kotulski, Z., Szalachowski, P. (2009). Adaptive Approach to Network Security. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2009. Communications in Computer and Information Science, vol 39. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02671-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02671-3_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02670-6

  • Online ISBN: 978-3-642-02671-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics