Identification of Threats and Security Risk Assessments for Recursive Internet Architecture
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F18%3APU130772" target="_blank" >RIV/00216305:26230/18:PU130772 - isvavai.cz</a>
Result on the web
<a href="https://ieeexplore.ieee.org/document/8105791/" target="_blank" >https://ieeexplore.ieee.org/document/8105791/</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/JSYST.2017.2765178" target="_blank" >10.1109/JSYST.2017.2765178</a>
Alternative languages
Result language
angličtina
Original language name
Identification of Threats and Security Risk Assessments for Recursive Internet Architecture
Original language description
There are several types of attacks on communication networks such as disrupting or blocking communication, intercepting, injecting fabricated packets, accessing and modifying the information. Here, for the first time the SecRAM, a recent security risk assessment methodology, is proposed to be systematically applied in a different context, i.e., to the network systems, specifically to an emerging network architecture called recursive internetwork architecture (RINA). The security risk assessment is performed to: identify run-time threats; assess the impact and likelihood of occurrence of attacks relevant to the threats; evaluate the RINA design principles; and validate the built-in security enablers and the mitigation actions that are devised to combat such attacks. Resulting from this assessment, specific measures are proposed to further improve cyber resiliency of the RINA, in securing its layers and components. The enhancement prevails through the utilization of multilayered security controls or the increase in their strength. We show how programmable security controls can assist in tackling network attacks. For proof of concept, we demonstrate formal analysis of some of the security properties of RINA using ProVerif tool and RINA Simulator. We apply the tool to create a formal model of a network and mitigate the selected attacks. The results of this analysis are provided.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
R - Projekt Ramcoveho programu EK
Others
Publication year
2018
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
IEEE Systems Journal
ISSN
1932-8184
e-ISSN
1937-9234
Volume of the periodical
12
Issue of the periodical within the volume
3
Country of publishing house
US - UNITED STATES
Number of pages
12
Pages from-to
2437-2448
UT code for WoS article
000443049900039
EID of the result in the Scopus database
2-s2.0-85034236121