Host-Based Security Challenges and Controls: A Survey of Contemporary Research

被引:1
|
作者
Price, Sean M. [1 ]
机构
[1] Sentinel Consulting, 14550 Chamberry Circle, Haymarket, VA 20169 USA
来源
INFORMATION SECURITY JOURNAL | 2008年 / 17卷 / 04期
关键词
circular threat; host based; mobile agents; trust;
D O I
10.1080/19393550802369800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security in host-based computing continues to be an area of regular research. Problems in host-based security exist in three principal areas: application protection, host environment protection, and data protection. These three areas echo the security issues for mobile agents: protecting agents from hostile hosts, protecting hosts from agents, and protecting data in transit as identified in Vuong and Peng (2001). Mobile agents are specialized applications which travel between hosts. Mobility is achieved by passing data and execution parameters from one host to another. A parallel can be drawn between mobile agents and host-based applications considering both perform host-based computations. In this paper we regard the security challenges for mobile agents equivalent to those of applications installed on a host. Furthermore, we also consider a circular threat that exists between applications and the host environment.
引用
收藏
页码:170 / 178
页数:9
相关论文
共 50 条
  • [1] A Survey on Host-Based Botnet Identification
    Ilavarasan, E.
    Muthumanickam, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 166 - 170
  • [2] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH
    Zhong, Shangqin
    Yao, Wenbin
    Ge, Haihui
    Yang, Yixian
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
  • [3] Host-Based Security Sensor Integrity in Multiprocessing Environments
    McEvoy, Thomas Richard
    Wolthusen, Stephen D.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 138 - 152
  • [4] A HOST-BASED SECURITY ASSESSMENT ARCHITECTURE FOR INDUSTRIAL CONTROL SYSTEMS
    Rakshit, Abhishek
    Ou, Xinming
    2009 2ND INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS 2009), 2009, : 7 - 12
  • [5] Effective reporting (ER) for mobile host-based security and forensics
    Jacoby, Grant A.
    Ransbottom, J. Scot
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 269 - 274
  • [6] Host-based Card Emulation: development, security, and ecosystem impact analysis
    Alattar, Mouhannad
    Achemlal, Mohammed
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 506 - 509
  • [7] Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
    Nallakaruppan, M. K.
    Somayaji, Siva Rama Krishnan
    Fuladi, Siddhesh
    Benedetto, Francesco
    Ulaganathan, Senthil Kumaran
    Yenduri, Gokul
    IEEE ACCESS, 2024, 12 : 31788 - 31797
  • [8] Fighting with Firewalld Architecting a Host-based Firewall Policy and the Challenges of Implementation
    McGhee, Erick
    Milton, Stephen
    Howard, Adam
    Rogers, Gary
    Krobatsch, Tom
    PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2024, PEARC 2024, 2024,
  • [9] Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element
    Umar, Assad
    Mayes, Keith
    Markantonakis, Konstantinos
    2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 56 - 61
  • [10] Lightweight Security Solution for Host-Based Mobility & Multi-Homing Protocols
    Hampel, Georg
    Kolesnikov, Vladimir
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 43 - 48