A Multi-Layer Secure Prevention Scheme for Improving E-commerce Security

被引:0
作者
Lai, Sen-Tarng [1 ]
Leu, Fang-Yie [2 ]
Chu, William Cheng-Chung [2 ]
机构
[1] Shih Chien Univ, Dept Informat Technol & Management, Taipei 10462, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
来源
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS) | 2014年
关键词
e-commerce; security requirement; event detection; security event; MLSPS;
D O I
10.1109/IMIS.2014.73
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.
引用
收藏
页码:505 / 510
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 2014, J INTERNET SERVICES
[2]   Software penetration testing [J].
Arkin, B ;
Stender, S ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :84-87
[3]   About penetration testing [J].
Bishop, Matt .
IEEE SECURITY & PRIVACY, 2007, 5 (06) :84-87
[4]  
eMarketer, 2013, 2012 GLOB E COMM SAL
[5]  
Evan S., 2006, GARTNER S2 BILLION E
[6]  
Garzoglio G., 2010, J PHYS C SERIES, V219
[7]  
Gun J.X., 2010, 80 PERCENT PEOPLE FE
[8]  
Holcombe C., 2007, Advanced Guide to eCommerce
[9]  
Hope P., 2007, SOFTWARE SECURITY RE
[10]  
Kals S., 2006, P 15 INT C WORLD WID, P247, DOI [DOI 10.1145/1135777.1135817, 10.1145/1135777.1135817]