DocumentCode
461372
Title
Threat-Based Configuration Architecture for Security Gateways
Author
Kuo, Chin-Fu ; Chen, Chi-Ying ; Shih, Chi-Sheng ; Kuo, Tei-Wei
Author_Institution
Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung
Volume
1
fYear
2006
fDate
Sept. 2006
Firstpage
1
Lastpage
6
Abstract
The paper proposed a software architecture for security gateways which allows the product designers or service providers to systematically configure the security software components. Current architecture leads to tremendous administration overhead and increases the chance of misconfiguration vulnerability. We proposed a novel software architecture to aid the product designers to avoid the misconfiguration vulnerability and the end-users to ease the administration overhead. The software architecture makes use the threats for the gateways and the occurance relation between the threats to configure the security software components on the gateways. With the software architecture, the end-users can focus on determining the desired security features rather than the software configuration. Moreover, the architecture allows the product designers or security service to incrementally revise the software configuration when new threats appear
Keywords
internetworking; network servers; software architecture; telecommunication security; security gateway; software architecture; threat-based configuration architecture; Computer architecture; Computer science; Computer security; Design engineering; Information security; National security; Product design; Software architecture; Software design; Tree graphs;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks, 2006. ICON '06. 14th IEEE International Conference on
Conference_Location
Singapore
ISSN
1556-6463
Print_ISBN
0-7803-9746-0
Type
conf
DOI
10.1109/ICON.2006.302564
Filename
4087691
Link To Document