loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Michał Chorás 1 ; Salvatore d’Antonio 2 ; Rafał Kozik 3 and Witold Hołubowicz 4

Affiliations: 1 ITTI Ltd.; Institute of Telecommunications, University of Technology & Life Sciences, Poland ; 2 Consorzio Interuniversitario Nazionale per l’Informatica CINI, Italy ; 3 Institute of Telecommunications, University of Technology & Life Sciences, Poland ; 4 Adam Mickiewicz University, Poland

Keyword(s): Network security, Heterogeneous network, Vulnerability database, Ontology management, INTERSECTION.

Related Ontology Subjects/Areas/Topics: Biomedical Engineering ; Data Engineering ; Databases and Datawarehouses ; Enterprise Information Systems ; Health Information Systems ; Information Systems Analysis and Specification ; Internet Technology ; Knowledge Management ; Ontologies and the Semantic Web ; Ontology and the Semantic Web ; Society, e-Business and e-Government ; Web Information Systems and Technologies ; Web Interfaces and Applications ; Web Security and Privacy ; XML and Data Management

Abstract: In this paper our approach to heterogeneous networks vulnerability handling is presented. Vulnerabilities of heterogeneous networks like satellite, GSM/GPRS, UMTS, wireless sensor networks and the Internet have been identified, classified and described in the framework of the European co-funded project, named INTERSECTION (INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks). Since computer security incidents usually occur across administrative domains and interconnected networks it is quite clear that it would be advantageous for different organizations and network operators to be able to share data on network vulnerabilities. The exchange of vulnerability information and statistics would be crucial for proactive identification of trends that can lead to incident prevention. Network operators have always been reticent to disclose information about attacks on their systems or through their networks. However, this tendency seems to be overcom e by the new awareness that it is only through cooperation that networking infrastructures can be made robust to attacks and failures. Starting from these considerations, we developed two components, namely INTERSECTION Vulnerability Database (IVD) and Project INTERSECTION Vulnerability Ontology Tool (PIVOT), for vulnerability data management and classification. Both tools will be presented in this paper. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.149.253.73

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chorás, M.; d’Antonio, S.; Kozik, R. and Hołubowicz, W. (2010). INTERSECTION APPROACH TO VULNERABILITY HANDLING. In Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 1: WEBIST; ISBN 978-989-674-025-2; ISSN 2184-3252, SciTePress, pages 171-174. DOI: 10.5220/0002790601710174

@conference{webist10,
author={Michał Chorás. and Salvatore d’Antonio. and Rafał Kozik. and Witold Hołubowicz.},
title={INTERSECTION APPROACH TO VULNERABILITY HANDLING},
booktitle={Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 1: WEBIST},
year={2010},
pages={171-174},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002790601710174},
isbn={978-989-674-025-2},
issn={2184-3252},
}

TY - CONF

JO - Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 1: WEBIST
TI - INTERSECTION APPROACH TO VULNERABILITY HANDLING
SN - 978-989-674-025-2
IS - 2184-3252
AU - Chorás, M.
AU - d’Antonio, S.
AU - Kozik, R.
AU - Hołubowicz, W.
PY - 2010
SP - 171
EP - 174
DO - 10.5220/0002790601710174
PB - SciTePress