Abstract | ||
---|---|---|
Autonomic networks and services are exposed to a large variety of security risks. The vulnerability management process plays a crucial role for ensuring their safe configurations and preventing security attacks. We focus in this survey on the assessment of vulnerabilities in autonomic environments. In particular, we analyze current methods and techniques contributing to the discovery, the description and the detection of these vulnerabilities. We also point out important challenges that should be faced in order to fully integrate this process into the autonomic management plane. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/SURV.2013.082713.00154 | Communications Surveys & Tutorials, IEEE |
Keywords | Field | DocType |
computer network security,fault tolerant computing,autonomic management plane,autonomic networks,autonomic services,security attacks,security risks,vulnerability assessment,vulnerability management process,Vulnerability assessment,autonomic computing,computer security,vulnerability management | Autonomic computing,Vulnerability (computing),Computer science,Vulnerability assessment,Computer security,Computer network,Vulnerability management,Security information and event management,Management plane,Vulnerability | Journal |
Volume | Issue | ISSN |
16 | 2 | 1553-877X |
Citations | PageRank | References |
3 | 0.67 | 32 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Martín Barrère | 1 | 7 | 1.81 |
Remi Badonnel | 2 | 154 | 22.43 |
Olivier Festor | 3 | 665 | 85.40 |