首页> 外文会议>Congreso Argentino de Ciencias de la Informatica y Desarrollos de Investigacion >Detection and analysis of vulnerabilities in convergent network platforms
【24h】

Detection and analysis of vulnerabilities in convergent network platforms

机译:收敛网络平台漏洞的检测与分析

获取原文

摘要

The technological changes that have been developing since the mid-1980s produced, among other effects, the unstoppable growth of the Internet. Thanks to the wide availability of bandwidth, an adequate context was created for the implementation of convergent networks, displacing the traditional voice and data networks, and making the Internet to become the public network model of this century. This fact, together with the availability of services in the cloud, brings new and numerous advantages, such as mobility, ubiquity, cost reduction in calls, among others; although this also brings new challenges such as the need of being able to establish certain security parameters to reduce the risks and mitigate the possible consequences of the actions of cybercriminals. The latter takes great importance because, although, any user having an Internet connection can access to this type of services, at the same time, it opens the possibility that any cybercriminal in the world could try to take possession of these systems, which could imply economic consequences or unavailability of resources. The present article shows the partial results of a Research Project that aims to analyze the different current attack vectors for the new convergent platforms, the digital defense technologies and the role of the users in the application, so as to be able to detect and analyze the vulnerabilities of the implementations together with the risks that may arise, and propose alternatives for their mitigation.
机译:自20世纪80年代中期以来一直在发展的技术变革,其中包括互联网的不可阻挡增长。由于带宽的广泛可用性,为实现融合网络的实现,使传统语音和数据网络的实现,并使互联网成为本世纪的公共网络模型。这一事实以及云中的服务的可用性,带来了新的和许多优势,如移动性,笨蛋,降低电话的成本降低;虽然这也带来了新的挑战,例如能够建立某些安全参数以减少风险并减轻网络犯罪分子的动作的可能后果。后者需要非常重要,虽然,但是,虽然具有互联网连接的任何用户可以访问这种类型的服务,同时它打开了世界上任何网络犯罪分目都可以尝试占有这些系统的可能性,这可能意味着资源的经济后果或不可用。本文展示了研究项目的部分结果,旨在分析新的收敛平台,数字防御技术和应用中用户在应用中的角色的不同电流攻击向量,以便能够检测和分析实现的脆弱性与可能出现的风险,并提出减缓替代方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号