Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: Internet, secure software, threats, cryptography process.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1130943

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 998

References:


[1] Intel Corp., “Intel® Data Protection Technology for Transactions “, http://www.intel.com/content/www/us/en/embedded/technology/security/secure-payment-transactions/overview.html, Viewed Jun 2016.
[2] Microsoft,” Secure Windows Server”, https://technet.microsoft.com/en-us/library/dd548350(v=ws.10).aspx, Viewed June 2016.
[3] Microsoft, “What’s New in DHCP”, https://technet.microsoft.com/en-us/library/dn765482.aspx, Viewed June 2016.
[4] Hewlett Packard, “HP Advanced Memory Protection technologies”, ftp://ftp.hp.com/pub/c-products/servers/options/c00256943.pdf, technology brief, 5th edition, April 2008.
[5] Trend Micro, “Devising a Server Protection Strategy with Trend Micro”, http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_devise-a-server-protection-strategy.pdf, January 2012.
[6] Yuan E., et al., “A Systematic Survey of Self-Protecting Software Systems”, ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 8 Issue 4, January 2014, Article No. 17.
[7] Lavasoft, “Potentially Unwanted Program Self-Protection Technologies”, http://lavasoft.com/mylavasoft/securitycenter/whitepapers/potentially-unwanted-program-selfprotection-technologies, October 2014.
[8] Lavasoft, “Potentially unwanted programs that use rootkit components, http://lavasoft.com/mylavasoft/securitycenter/whitepapers/pups-with-rootkit, September 2014.
[9] Feiman Joseph, “Runtime Self Protection: A Must Have, Emerging Security Technology”, Gartner Group, 24 April 2012.
[10] Gonzalez C. “User Detection in Secure Self-Protected Software”, Submitted to ROMJIST Sep 2015.
[11] Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119-131.
[12] Scarfone, Karen; Mell, Peter. "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800-94) (February 2007).
[13] Jorgensen J., et al., “Cyber Ecology: Looking to Ecology for Insights into Information Assurance”, Proceedings of DISCEX 2001, IEEE, 287-296.
[14] Gorman SP., and Malecki EJ.,” Fixed and fluid: stability and change in the geography of the Internet”, Telecommunications Policy 26 (7), 389-413.
[15] Gupta Ajay and Sekar R.,” An Approach for Detecting Self-Propagating Email Using Anomaly Detection”, Recent Advances in Intrusion Detection, 2003 – Springer.
[16] Wang Y., et al., “Software Diversity Measurement for Security Evaluation: An Ecological Approach”, I. J. Computer Network and Information Security, 2015, 4, 37-43.
[17] Mukherjee B., Heberlein L.T, Levitt K. N.,”Network Intrusion Detection”, IEEE Network May 1994.
[18] Creston News Advertiser, “Protect yourself in the online, social network community”, 11 Feb 2011. http://www.crestonnewsadvertiser.com/articles/ara/2011/02/11/8044960708/index.xm
[19] Scarfone Karen, Mell Peter., "Guide to Intrusion Detection and Prevention Systems (IDPS)", Computer Security Resource Center (National Institute of Standards and Technology), February 2007.
[20] Microsoft, "Improving Web Application Security: Threats and Countermeasures", msdn.microsoft.com. Viewed June 2016.
[21] University of Alabama at Birmingham Business Program. "Information Security: A Growing Need of Businesses and Industries Worldwide". http://businessdegrees.uab.edu/resources/infographics/mis-security-infographic/, Viewed May 2016.