Abstract
In current times, sending confidential data over the Internet is becoming more commonplace every day. The process of sending confidential data over the Internet is, however, concomitant with great effort: encryption algorithms have to be incorporated and encryption key management and distribution have to take place. Wouldn’t it be easier, more secure and faster if only technology could be introduced to do risk analysis in real time? The objective of doing risk analysis in real time is to find a method through which dynamically to determine the vulnerability of, for example, a TCP/IP packet in terms of generic threat categories such as interception and fabrication. Once the vulnerability of the packet has been determined, the appropriate countermeasures can be activated to secure the packet before it is sent off to its original destination. The countermeasures are activated according to certain data that is found in and extracted from the TCP/IP packets. In order to be able to obtain this data, each TCP/IP packet flowing through a certain point in a network is intercepted and analysed.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35575-7_19
Chapter PDF
Similar content being viewed by others
List of Sources Consulted
COMER, D.E.; 1997; Computer Networks and Internets; “Encapsulation”; ISBN 0–13–239070–1; New Jersey: Prentice Hall; p. 230.
DE RU, W.G.; ELOFF, J.H.P.; November 1997; Computers and Security; “Riskanalysis modelling with the use of fuzzy logic”; Vol. 15 no. 3; pp. 239–248.
RAPTOR SYSTEMS; 1998; Technical White Paper: The Eagle 5.0 Firewall; “Overview of Eagle 5.0 Features”; http://www.raptor.com.
CHECKPOINT SOFTWARE TECHNOLOGIES LIMITED; 1999; Firewall-1; http://www.checkpoint.com.
FORD, W.; BAUM, M.S.; 1997; Secure Electronic Commerce; “Packet Encryption”; ISBN 0–13–476342–4; Prentice Hill; pp. 149–150.
TRUSTED INFORMATION SYSTEMS INCORPORATED; 1999; Firewall Toolkit; http://www.tis.com.
IBM CONSULTING GROUP; 1997; IBM Firewall Version 3.2 for AIX at a Glance; “What is a firewall?”; International Business Machines Corporation; Second edition; pp. 5 - 7; http://www.computerps.com/internet/security/firewalls/.
INTE 98] INTERNIC; 20 March 1998; Internic 15 Minute Series; “What is a Packet?”; http://krikkit.tss.nwu.edu/dss/training/internic/.
LABUSCHAGNE, L.; ELOFF, J.H.P.; 1998; Computers and Security; “The Use of RtRA to Enable Dynamic Activation of Countermeasures”; Vol. 17 no. 4; pp. 347–357.
PABRAI, U.O.; GURBANI V.K.; 1996; Internet & TCP/IP Network Security, “TCP/IP and Security”; ISBN 0–07–048215–2; McGraw–Hill; pp. 69–74.
PFLEEGER, C.P.; 1989; Security in Computing; ISBN 0–13–799016–2; pp. 3–4.
PRICE, K.; 1998; Intrusion Detection; “Characteristics of a Good Intrusion Detection System”; http://www.cs.purdue.edu/coast/intrusion-detection/.
AXENT TECHNOLOGIES; 1998; Raptor Firewall; “Raptor Firewall 5.0 White Paper”; http://www.axent.com/product/rsbu/firewal14nt/default.htm.
RAPTOR SYSTEMS; 1998; Raptor Firewall 5.0 Frequently Asked Questions (FAQ); “What is the Raptor Firewall 5.0 for Solaris?”; http://www.raptor.com/products/solaris5/s50faq.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Venter, H.S., Labuschagne, L., Eloff, J.H.P. (1999). Real-time Risk Analysis on the Internet. In: Eloff, J.H.P., Labuschagne, L., von Solms, R., Verschuren, J. (eds) Information Security Management & Small Systems Security. IFIP — The International Federation for Information Processing, vol 26. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35575-7_2
Download citation
DOI: https://doi.org/10.1007/978-0-387-35575-7_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5483-4
Online ISBN: 978-0-387-35575-7
eBook Packages: Springer Book Archive