
Leonardo Lemes FagundesUniversidade do Vale do Rio dos Sinos | UNISINOS
Leonardo Lemes Fagundes
About
19
Publications
675
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations
Citations since 2017
Publications
Publications (19)
O processo de Gestão de Riscos (GR) compreende atividades coordenadas para direcionar e controlar uma organização no que se refere a riscos, isso inclui a definição de contexto, análise, avaliação, tratamento, aceitação, comunicação e monitoramento dos riscos de segurança da informação. As organizações precisam implementar GR de forma consistente e...
In recent years, the number of planned and coordinated attacks, such as DDoS (Distributed Denial of Service), has increased significantly. These attacks, also known as multistage attacks, are composed of several stages and originated from multiple sources (hosts). Traditional Intrusion Detection Systems (IDSes) do not tackle adequately such attacks...
The risk management (RM) process comprises coordinated activities aimed at guiding and controlling an organization as far as risks are concerned. These activities encompass the definition of the context of analysis, assessment, treatment, acceptance, as well as the communication and the monitoring of information security risks. Organizations should...
The management of the Border Gateway Protocol (BGP) in the context of Internet eXchange Points (IXPs) lacks proper solutions. IXPs typically present a high volume of routing information being exchanged among the connected parties. The BGP4 MIB module, which exposes most of the relevant BGP4 management information, fails to provide information speci...
Nos últimos anos tem se observado o avanço de ataques planejados, como DDoS, compostos de múltiplas etapas e partindo de diversos hosts. As soluções mais tradicionais para detecção de intrusão não estão preparadas para lidar com essa natureza de ataque devido, entre outros fatores, à carência de mecanismos para comunicação uniforme com diferentes s...
Este artigo apresenta uma arquitetura baseada em web services para detecção de ataques distribuídos e de múltiplas etapas. A arquitetura oferece um mecanismo uniforme de comunicação com diferentes serviços de segurança e possibilita a correlação de eventos gerados pelos mesmos, bem como a execução de ações de contramedidas.
Intrusion Detection Systems (IDSs) have become an essential component to improve security in networked environments. The increasing set of available IDSs has stimulated research projects that investigate means to assess them and to find out their strengths and limitations (in order to improve the IDSs themselves) and to assist the security manager...
Os sistemas de detecção de intrusão, Intrusion Detection Systems (IDSs), têm se tornado um componente essencial para aprimorar a segurança em ambientes interligados. O conjunto crescente de IDSs disponíveis tem estimulado projetos de pesquisa que investigam mecanismos para avaliá-los com o objetivo de identificar suas potencialidades e limitações (...
This chapter presents a very current theme that has received substantial attention from both academic and industrial communities: the computer forensics. The scientific and systematic inspection of computational environments, with the goal of figuring out and reconstruct events, still has lot of open research topics. On industry, the interest on th...
Risk Management (RM) are coordinated activities to direct and c ontrol an organization with regard to risk, and that includes analysis, evaluation, treatment, acceptance and risks reporting. The organization needs to implement RM in a reliable and methodical way in compliance to regulations, norms and laws, and also need to fulfill mandatory requis...
In the recent years , the number of planned attacks such as DDoS, has increased. These attacks are composed of several stages and depart from a number of hosts. Traditional intrusion detection solutions do not cope well with this type of attack because, among other reasons, they lack mechanisms for uniform communication with distinct security syste...
The business continuity management is a process that identifies threats and their possible impacts. This process provides an appropriate structure for the organization to respond effectively in case of incidents. The purpose of this chapter is to present the theoretical and practical aspects of business continuity management with focus to the prepa...