Leonardo Lemes Fagundes

Leonardo Lemes Fagundes
Universidade do Vale do Rio dos Sinos | UNISINOS

About

19
Publications
675
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations
Citations since 2017
1 Research Item
26 Citations
20172018201920202021202220230246810
20172018201920202021202220230246810
20172018201920202021202220230246810
20172018201920202021202220230246810

Publications

Publications (19)
Conference Paper
O processo de Gestão de Riscos (GR) compreende atividades coordenadas para direcionar e controlar uma organização no que se refere a riscos, isso inclui a definição de contexto, análise, avaliação, tratamento, aceitação, comunicação e monitoramento dos riscos de segurança da informação. As organizações precisam implementar GR de forma consistente e...
Conference Paper
In recent years, the number of planned and coordinated attacks, such as DDoS (Distributed Denial of Service), has increased significantly. These attacks, also known as multistage attacks, are composed of several stages and originated from multiple sources (hosts). Traditional Intrusion Detection Systems (IDSes) do not tackle adequately such attacks...
Article
The risk management (RM) process comprises coordinated activities aimed at guiding and controlling an organization as far as risks are concerned. These activities encompass the definition of the context of analysis, assessment, treatment, acceptance, as well as the communication and the monitoring of information security risks. Organizations should...
Article
The management of the Border Gateway Protocol (BGP) in the context of Internet eXchange Points (IXPs) lacks proper solutions. IXPs typically present a high volume of routing information being exchanged among the connected parties. The BGP4 MIB module, which exposes most of the relevant BGP4 management information, fails to provide information speci...
Conference Paper
Nos últimos anos tem se observado o avanço de ataques planejados, como DDoS, compostos de múltiplas etapas e partindo de diversos hosts. As soluções mais tradicionais para detecção de intrusão não estão preparadas para lidar com essa natureza de ataque devido, entre outros fatores, à carência de mecanismos para comunicação uniforme com diferentes s...
Conference Paper
Este artigo apresenta uma arquitetura baseada em web services para detecção de ataques distribuídos e de múltiplas etapas. A arquitetura oferece um mecanismo uniforme de comunicação com diferentes serviços de segurança e possibilita a correlação de eventos gerados pelos mesmos, bem como a execução de ações de contramedidas.
Conference Paper
Full-text available
Intrusion Detection Systems (IDSs) have become an essential component to improve security in networked environments. The increasing set of available IDSs has stimulated research projects that investigate means to assess them and to find out their strengths and limitations (in order to improve the IDSs themselves) and to assist the security manager...
Conference Paper
Os sistemas de detecção de intrusão, Intrusion Detection Systems (IDSs), têm se tornado um componente essencial para aprimorar a segurança em ambientes interligados. O conjunto crescente de IDSs disponíveis tem estimulado projetos de pesquisa que investigam mecanismos para avaliá-los com o objetivo de identificar suas potencialidades e limitações (...
Article
This chapter presents a very current theme that has received substantial attention from both academic and industrial communities: the computer forensics. The scientific and systematic inspection of computational environments, with the goal of figuring out and reconstruct events, still has lot of open research topics. On industry, the interest on th...
Article
Risk Management (RM) are coordinated activities to direct and c ontrol an organization with regard to risk, and that includes analysis, evaluation, treatment, acceptance and risks reporting. The organization needs to implement RM in a reliable and methodical way in compliance to regulations, norms and laws, and also need to fulfill mandatory requis...
Article
In the recent years , the number of planned attacks such as DDoS, has increased. These attacks are composed of several stages and depart from a number of hosts. Traditional intrusion detection solutions do not cope well with this type of attack because, among other reasons, they lack mechanisms for uniform communication with distinct security syste...
Article
The business continuity management is a process that identifies threats and their possible impacts. This process provides an appropriate structure for the organization to respond effectively in case of incidents. The purpose of this chapter is to present the theoretical and practical aspects of business continuity management with focus to the prepa...

Network

Cited By