An approach for enhancing the security of remotely accessible, sensitive services with on-site monitoring

Tuomas Kekkonen, Teemu Kanstren

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    Commonly, the deployment environment of software based services cannot be predicted in advance, which leads to need to have specific solutions to monitor their security and reliability during runtime. These services are also commonly accessed remotely, leading to further complexity in their monitoring and analysis. The work presented in this paper proposes a solution for enhanced security monitoring of such services, providing for increased confidence in the service security and reliability. The proposed solution uses near-real time information collected about the service and its environment during its use. The approach is evaluated using a case study of monitoring a mobile payment service showing increased awareness and confidence of service security.
    Original languageEnglish
    Title of host publicationProceedings of the 5th International Conference on Emerging Security Information, Systems and technologies, SECURWARE 2011
    PublisherInternational Academy, Research, and Industry Association IARIA
    Pages36-43
    ISBN (Print)978-1-61208-146-5
    Publication statusPublished - 2011
    MoE publication typeA4 Article in a conference publication
    Event5th International conference on emerging security information, systems and technologies, SECURWARE 2011 - Nice , France
    Duration: 21 Aug 201127 Aug 2011

    Conference

    Conference5th International conference on emerging security information, systems and technologies, SECURWARE 2011
    Abbreviated titleSECURWARE 2011
    CountryFrance
    CityNice
    Period21/08/1127/08/11

    Keywords

    • network monitoring
    • security situation awareness
    • security management
    • security policy
    • network capture

    Fingerprint Dive into the research topics of 'An approach for enhancing the security of remotely accessible, sensitive services with on-site monitoring'. Together they form a unique fingerprint.

    Cite this