Oleg Polyakov
I am interested in both theoretical and applied aspects of Network Simulation, Mobile Routing Problems, Wireless Networking, Software-defined networking (SDN) and Network Function Virtualization (NFV)
Address: Ottawa, Canada
Address: Ottawa, Canada
less
Related Authors
International Journal of Computer Techniques IJCT
Anna University
sriuma ravula
JNTU College of Engineering, kakinada
International Research Group - IJET JOURNAL
Anna University
saurabh mishra
D.I.T. University
Mouhannad Alattar
University of Franche-Comte
InterestsView All (7)
Uploads
Papers by Oleg Polyakov
anymore.
Traditional strategies are based on a signature approach where the security system is familiar
with the behavior (signature) of the possible threats. The known signatures are stored in a
database that is used by security systems for constant monitoring of the organizational
behavior—network, storage, devices, users, etc. Therefore, the traditional approach could be
described by the Latin motto praemonītus praemūnītus, i.e., “forewarned, forearmed.”
The number of threats is growing rapidly, making it very difficult to be “forewarned.” In the
modern cyber battlefield, security operations centers (SOCs) face daily, new threats where
signatures are not known. It’s unacceptable to sit back and wait until someone investigates the
new threats and creates new signatures.
But that doesn’t mean that a signature-based approach isn’t valid anymore. After all, cyber
protection is usually designed like an onion with several layers of defense. In this onion
architecture, there is one missing layer—the layer that deals with new, unknown threats.
anymore.
Traditional strategies are based on a signature approach where the security system is familiar
with the behavior (signature) of the possible threats. The known signatures are stored in a
database that is used by security systems for constant monitoring of the organizational
behavior—network, storage, devices, users, etc. Therefore, the traditional approach could be
described by the Latin motto praemonītus praemūnītus, i.e., “forewarned, forearmed.”
The number of threats is growing rapidly, making it very difficult to be “forewarned.” In the
modern cyber battlefield, security operations centers (SOCs) face daily, new threats where
signatures are not known. It’s unacceptable to sit back and wait until someone investigates the
new threats and creates new signatures.
But that doesn’t mean that a signature-based approach isn’t valid anymore. After all, cyber
protection is usually designed like an onion with several layers of defense. In this onion
architecture, there is one missing layer—the layer that deals with new, unknown threats.