Filters








413,205 Hits in 7.7 sec

A Case Study of Three Open Source Security Management Tools [chapter]

Hilmi Gunes Kayacik, A. Nur Zincir-Heywood
2003 Integrated Network Management VIII  
Three open source security management tools -Snort, Pakemon, and Argusare benchmarked against DARPA 1999 Intrusion Detection Evaluation Data Set.  ...  The results show that different tools perform well under different attack categories; hence they can be run at the same time to increase the detection rate of attack instances.  ...  ACKNOWLEDEGEMENTS The authors gratefully acknowledge the financial support of the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1007/978-0-387-35674-7_10 fatcat:76yugyorsrgcjov6rm74jjadci

A case study of three open source security management tools

H.G. Kayacik, A.N. Zincir-Heywood
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.  
Three open source security management tools -Snort, Pakemon, and Argusare benchmarked against DARPA 1999 Intrusion Detection Evaluation Data Set.  ...  The results show that different tools perform well under different attack categories; hence they can be run at the same time to increase the detection rate of attack instances.  ...  ACKNOWLEDEGEMENTS The authors gratefully acknowledge the financial support of the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1109/inm.2003.1194165 fatcat:so5wfp6uobdepc3mchxx4fepzy

ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool

Tejas Shah, S. V.
2019 International Journal of Computer Applications  
The "ReqPriSec" tool is tested and evaluated based on different parameters on E-voting case study.  ...  There is a strong need of versatile and security-privacy aware RE tool to elicit, manage and specify requirement efficiently and in standardized format.  ...  Case Study Based Evaluation This section present the result of evaluation which is carried out on "ReqPriSec" tool along with four open source RE tools.  ... 
doi:10.5120/ijca2019919071 fatcat:pes2xv6m3zfabobm3a5eqpizfm

Data Life Cycle: Towards a Reference Architecture

Mohammed EL Arass
2020 International Journal of Advanced Trends in Computer Science and Engineering  
and testing a security information and events system POC (Proof Of Concept) made up of a Big Data platform and open source security tools.  ...  We validated the proposed architecture through a case study of a company that wants to manage the huge amount of information and events produced by all the IT infrastructure including designing, implementing  ...  CASE STUDY In this section, we present a validation of the proposed architecture through a case study of a Company that we designated "Company" for confidentiality reasons.  ... 
doi:10.30534/ijatcse/2020/215942020 fatcat:rbnyq5fsv5hfpo2oknvet62t7y

On the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project

Anh Nguyen-Duc, Manh-Viet Do, Quan Luong-Hong, Kiem Nguyen-Khac, Hoang Truong-Anh
2021 Advances in Science, Technology and Engineering Systems  
In this work, we reported a longitudinal case study of adopting SAST as a part of a humandriven security assessment for an open-source e-government project.  ...  Our result shows that (1) while some SAST tools outperform others, it is possible to achieve better performance by combining more than one SAST tools and (2) SAST tools should be used towards a practical  ...  Acknowledgement This paper is supported by Vietnam Ministry of Science and Technology under the project "Secured Open source-software Repository for E-Government", number KC.01.16/16-20.  ... 
doi:10.25046/aj0602105 fatcat:xrt5b3znwrhuxkffedzxqgkmfu

The AMASS Tool Platform: An Innovative Solution for Assurance and Certication of Cyber-Physical Systems

Jose Luis de la Vara, Eugenio Parra, Alejandra Ruiz, Barbara Gallina
2020 Requirements Engineering: Foundation for Software Quality  
This Platform is an open source solution that supports the main activities for assurance and certification.  ...  The underlying activities can be complex and labour-intensive, thus practitioners need tools that facilitate them. We present the AMASS Tool Platform as an example of these tools.  ...  We are also grateful to all the people that have contributed to the development of the AMASS Tool Platform.  ... 
dblp:conf/refsq/VaraPRG20 fatcat:lm5cnekdzvbcphtafexyoof7iq

On the combination of static analysis for software security assessment – a case study of an open-source e-government project [article]

Anh Nguyen-Duc, Manh Viet Do, Quan Luong Hong, Kiem Nguyen Khac
2021 arXiv   pre-print
In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government project.  ...  Our result shows that (1) while some SAST tools out-perform others, it is possible to achieve better performance by combining more than one SAST tools and (2) SAST tools should be used towards a practical  ...  Acknowledgement This work was co-funded under the Vietnam national project entitled "SOREG -Secured Open source-software Repository for E-Government". The project is led by MQ Solution 9 .  ... 
arXiv:2103.08010v2 fatcat:tqv4oj52yfg27hqfs3podcomuy

STORM - Collaborative Security Management Environment [chapter]

Theodoros Ntouskas, George Pentafronimos, Spyros Papastergiou
2011 Lecture Notes in Computer Science  
Identifying these weaknesses and exploiting advanced open-source technologies and interactive software tools, we propose a secure, collaborative environment (STORM) for the security management of ICS's  ...  Organizations spend a lot of money and time to implement their security policy.  ...  open source and freeware VA tools, installation guides, VA scenarios, case studies; the countermeasures proposed by the Risk management module; security corporate documentation i.e. security policies,  ... 
doi:10.1007/978-3-642-21040-2_23 fatcat:qmgepfhmgvdtffao7com65kxjy

An MADM risk-based evaluation-selection model of free-libre open source software tools

Ovsei Gelman, Jorge Marx Gómez, Rory V. O'Connor, Manuel Mora
2016 International Journal of Technology, Policy and Management  
Free-Libre Open Source Software (FLOSS) tools are free-cost license highly attractive to be implemented by organizations.  ...  Reference to this paper should be made as follows: Mora, M., Marx Gómez, J., O'Connor, R.V. and Gelman, O. (2016) 'An MADM risk-based evaluation-selection model of free-libre open source software tools  ...  Acknowledgments This research was supported by the PIINF14-3 grant provided by the Autonomous University of Aguascalientes for the period 2014-2015.  ... 
doi:10.1504/ijtpm.2016.10002522 fatcat:kotebj2x55gore7smfaqe6dxqa

Intrusion Detection using Open Source Tools

Jack TIMOFTE
2008 Informatică economică  
In this paper we will present three open source IDS tools: OSSEC, Prelude and SNORT.  ...  We have witnessed in the recent years that open source tools have gained popularity among all types of users, from individuals or small businesses to large organizations and enterprises.  ...  Snort (www.snort.org) is, without doubt, one of the most popular open source security tools.  ... 
doaj:20144e5f021845ec89ee9f892e260983 fatcat:ilxbelw2jzcndd2n37dtcggdvy

Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals

Julius Francis Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, Riikka Niemelä
2017 Journal of ICT Standardization  
In this paper, we open up discussions on business possibilities relevant to Internet of Things-mobile device management for critical infrastructures such as future digital hospital.  ...  We apply business models as a conceptual lens to analyze how cybersecurity business could evolve for 5G enabled IoT-Mobile device management providers as a cybersecurity vendor.  ...  Acknowledgment This study has been supported by the DIMECC Cyber Trust -Digital cyber security program.  ... 
doi:10.13052/jicts2245-800x.516 fatcat:jcik3sgrgrd7doneiur2kxpi4y

A Big Data Lake for Multilevel Streaming Analytics [article]

Ruoran Liu, Haruna Isah, Farhana Zulkernine
2020 arXiv   pre-print
We discuss and compare different open source and commercial platforms that can be used to develop a data lake.  ...  This study can serve as a guide for individuals or organizations planning to implement a data lake solution for their use cases.  ...  ACKNOWLEDGMENT We would like to express a special thanks to the Southern Ontario Smart Computing for Innovation Platform (SOSCIP), Ontario Centres of Excellence (OCE) and IBM Canada for supporting this  ... 
arXiv:2009.12415v1 fatcat:riscmxr55vaolj2or7izhgcrkm

VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure [article]

Frederik L. Dennig, Eren Cakmak, Henrik Plate, Daniel A. Keim
2021 arXiv   pre-print
We show the applicability of our tool through a use case and preliminary expert feedback.  ...  The prevalent usage of open-source software (OSS) has led to an increased interest in resolving potential third-party security risks by fixing common vulnerabilities and exposures (CVEs).  ...  One participant acted as program manager for open-source security and DevSecOps, determining requirements, developing tools, and standardizing the secure consumption and publication of opensource components  ... 
arXiv:2108.06259v2 fatcat:rgc4ugtw3ncpzmqz4fcue6paiq

NoSQL security: can my data-driven decision-making be affected from outside? [article]

Anastasija Nikiforova, Artjoms Daskevics, Otmane Azeroual
2022 arXiv   pre-print
This chapter aims at examining the state of the security of open data databases representing both relational databases and NoSQL, with a particular focus on a later category.  ...  One of these risks is posed by open data sources, by which are meant databases, which are not properly protected.  ...  SEARCH ENGINE FOR THE INTERNET OF EVERYTHING AS A TOOL FOR DETECTING VULNERABLE OPEN DATA SOURCES Search Engine for the IoE-based tool called Shodan-and Binary Edge-based vulnerable open data sources detection  ... 
arXiv:2206.11787v1 fatcat:c7gkportkba6bnq372aktksqiy

A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints

Uchenna Daniel Ani, Jeremy McKendrick Watson, Madeline Carr, Al Cook, Jason RC Nurse
2020 The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology  
This study contributes new insights from security and functionality characteristics metrics to underscore the use and effectiveness of open source simulators.  ...  Several open source simulators span applications in communications and wireless sensor networks, industrial control systems, and the Industrial Internet of Things.  ...  Lastly, considering security as a key focus, the study also aimed to determine the open source tools that are characterized to address security-related simulation scenarios, and to understand the specific  ... 
doi:10.1177/1548512920953499 fatcat:d47gxkzznveoplad3ssofo3k5i
« Previous Showing results 1 — 15 out of 413,205 results