TY - GEN
T1 - Threat-Based Configuration Architecture for Security Gateways
AU - Kuo, Chin-Fu
AU - Chen, Chi-Ying
AU - Shih, Chi-Sheng
AU - Kuo, Tei-Wei
PY - 2006/9
Y1 - 2006/9
N2 - The paper proposed a software architecture for security gateways which allows the product designers or service providers to systematically configure the security software components. Current architecture leads to tremendous administration overhead and increases the chance of misconfiguration vulnerability. We proposed a novel software architecture to aid the product designers to avoid the misconfiguration vulnerability and the end-users to ease the administration overhead. The software architecture makes use the threats for the gateways and the occuranee relation between the threats to configure the security software components on the gateways. With the software architecture, the end-users can focus on determining the desired security features rather than the software configuration. Moreover, the architecture allows the product designers or security service to incrementally revise the software configuration when new threats appear.
AB - The paper proposed a software architecture for security gateways which allows the product designers or service providers to systematically configure the security software components. Current architecture leads to tremendous administration overhead and increases the chance of misconfiguration vulnerability. We proposed a novel software architecture to aid the product designers to avoid the misconfiguration vulnerability and the end-users to ease the administration overhead. The software architecture makes use the threats for the gateways and the occuranee relation between the threats to configure the security software components on the gateways. With the software architecture, the end-users can focus on determining the desired security features rather than the software configuration. Moreover, the architecture allows the product designers or security service to incrementally revise the software configuration when new threats appear.
UR - http://www.scopus.com/inward/record.url?scp=46449101553&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-46449101553&origin=recordpage
U2 - 10.1109/ICON.2006.302564
DO - 10.1109/ICON.2006.302564
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 0780397460
SN - 9780780397460
VL - 1
T3 - Proceedings - IEEE International Conference on Networks, ICON
SP - 224
EP - 229
BT - Proceedings - 2006 IEEE International Conference on Networks (ICON 2006)
T2 - 2006 IEEE International Conference on Networks (ICON 2006)
Y2 - 13 September 2006 through 15 September 2006
ER -