• DocumentCode
    461372
  • Title

    Threat-Based Configuration Architecture for Security Gateways

  • Author

    Kuo, Chin-Fu ; Chen, Chi-Ying ; Shih, Chi-Sheng ; Kuo, Tei-Wei

  • Author_Institution
    Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung
  • Volume
    1
  • fYear
    2006
  • fDate
    Sept. 2006
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The paper proposed a software architecture for security gateways which allows the product designers or service providers to systematically configure the security software components. Current architecture leads to tremendous administration overhead and increases the chance of misconfiguration vulnerability. We proposed a novel software architecture to aid the product designers to avoid the misconfiguration vulnerability and the end-users to ease the administration overhead. The software architecture makes use the threats for the gateways and the occurance relation between the threats to configure the security software components on the gateways. With the software architecture, the end-users can focus on determining the desired security features rather than the software configuration. Moreover, the architecture allows the product designers or security service to incrementally revise the software configuration when new threats appear
  • Keywords
    internetworking; network servers; software architecture; telecommunication security; security gateway; software architecture; threat-based configuration architecture; Computer architecture; Computer science; Computer security; Design engineering; Information security; National security; Product design; Software architecture; Software design; Tree graphs;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks, 2006. ICON '06. 14th IEEE International Conference on
  • Conference_Location
    Singapore
  • ISSN
    1556-6463
  • Print_ISBN
    0-7803-9746-0
  • Type

    conf

  • DOI
    10.1109/ICON.2006.302564
  • Filename
    4087691