Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system
Conference paper
Ouedraogo, Moussa, Khadraoui, Djamel, De Rémont, Benoît, Dubois, Eric and Mouratidis, Haralambos 2008. Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system. proceedings of NTMS'2008. The 2nd International Conference on New technologies Mobility and Security
Authors | Ouedraogo, Moussa, Khadraoui, Djamel, De Rémont, Benoît, Dubois, Eric and Mouratidis, Haralambos |
---|---|
Type | Conference paper |
Abstract | In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are reluctant to use such systems. In that respect, providing stakeholders with quantifiable evidences that the countermeasures deployed on the system are operating adequately is an important step towards better control of security failures for network administrators on one hand, and an increase in end users' trust in using these systems on the other. It is in that perspective that BUGYO, a methodology to assess the security of telecommunication networks and services in terms of assurance levels, was proposed to address the shortcomings of existing security assurance and risks management methodologies in measuring, documenting and maintaining security assurance of telecommunication services. In this paper, we provide an overview of the BUGYO methodology and we demonstrate its applicability (mainly with respect to the specification of assurance metrics) on a VoIP service infrastructure based on open source components. |
Keywords | Security assurance; metrics specification; probes; measurement; aggregation; Telecommunication infrastructures; VoIP service; risks mangement |
Year | 2008 |
Conference | proceedings of NTMS'2008 |
Accepted author manuscript | License CC BY-ND |
Publication dates | |
Nov 2008 | |
Publication process dates | |
Deposited | 13 Jan 2010 |
Web address (URL) | http://dx.doi.org/10.1109/NTMS.2008.ECP.38 |
http://hdl.handle.net/10552/475 | |
Additional information | Citation: |
Place of publication | Mobility and Security |
https://repository.uel.ac.uk/item/864v9
Download files
118
total views232
total downloads1
views this month0
downloads this month