All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Identification of Threats and Security Risk Assessments for Recursive Internet Architecture

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F18%3APU130772" target="_blank" >RIV/00216305:26230/18:PU130772 - isvavai.cz</a>

  • Result on the web

    <a href="https://ieeexplore.ieee.org/document/8105791/" target="_blank" >https://ieeexplore.ieee.org/document/8105791/</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/JSYST.2017.2765178" target="_blank" >10.1109/JSYST.2017.2765178</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Identification of Threats and Security Risk Assessments for Recursive Internet Architecture

  • Original language description

    There are several types of attacks on communication networks such as disrupting or blocking communication, intercepting, injecting fabricated packets, accessing and modifying the information. Here, for the first time the SecRAM, a recent security risk assessment methodology, is proposed to be systematically applied in a different context, i.e., to the network systems, specifically to an emerging network architecture called recursive internetwork architecture (RINA). The security risk assessment is performed to: identify run-time threats; assess the impact and likelihood of occurrence of attacks relevant to the threats; evaluate the RINA design principles; and validate the built-in security enablers and the mitigation actions that are devised to combat such attacks. Resulting from this assessment, specific measures are proposed to further improve cyber resiliency of the RINA, in securing its layers and components. The enhancement prevails through the utilization of multilayered security controls or the increase in their strength. We show how programmable security controls can assist in tackling network attacks. For proof of concept, we demonstrate formal analysis of some of the security properties of RINA using ProVerif tool and RINA Simulator. We apply the tool to create a formal model of a network and mitigate the selected attacks. The results of this analysis are provided.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    R - Projekt Ramcoveho programu EK

Others

  • Publication year

    2018

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    IEEE Systems Journal

  • ISSN

    1932-8184

  • e-ISSN

    1937-9234

  • Volume of the periodical

    12

  • Issue of the periodical within the volume

    3

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    12

  • Pages from-to

    2437-2448

  • UT code for WoS article

    000443049900039

  • EID of the result in the Scopus database

    2-s2.0-85034236121