Overview
- Editors:
-
-
Ehab Al-Shaer
-
Department of Software and Information Systems, University of North Carolina Charlotte, Charlotte, USA
-
Xinming Ou
-
Computing and Information Sciences, Kansas State University, Manhattan, USA
-
Geoffrey Xie
-
Department of Computer Science, Naval Postgraduate School, Monterey, USA
- Discusses how to manage the complex security risk of configuration settings of network systems
- Explores the relationship between vulnerability assessment and security automation
- Covers automated/dynamic defense based risk
- Offers a comprehensive coverage of security automation
Access this book
Other ways to access
Table of contents (11 chapters)
-
Front Matter
Pages i-viii
-
Configuration Modeling and Checking
-
-
- Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy
Pages 3-19
-
-
Vulnerability and Risk Assessment
-
-
- MartÃn Barrère, Gaëtan Hurel, Rémi Badonnel, Olivier Festor
Pages 41-58
-
- Mohammad Ashiqur Rahman, Ehab Al-Shaer
Pages 59-77
-
- Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq
Pages 79-95
-
Configuration Analytics
-
-
- Shankaranarayanan Puzhavakath Narayanan, Seungjoon Lee, Subhabrata Sen
Pages 99-117
-
- Hayawardh Vijayakumar, Trent Jaeger
Pages 119-133
-
- Meixing Le, Krishna Kant, Sushil Jajodia
Pages 135-149
-
Diagnostics and Discovery
-
Front Matter
Pages 151-151
-
- Michael R. Clement, Dennis Volpano
Pages 153-167
-
- Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto
Pages 169-178
-
- Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto
Pages 179-187
About this book
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.
Editors and Affiliations
-
Department of Software and Information Systems, University of North Carolina Charlotte, Charlotte, USA
Ehab Al-Shaer
-
Computing and Information Sciences, Kansas State University, Manhattan, USA
Xinming Ou
-
Department of Computer Science, Naval Postgraduate School, Monterey, USA
Geoffrey Xie