Abstract
With the rapid progress of the Internet, security incidents are increasing and are becoming more sophisticated. Current trends in security incidents include not only cyber security threats such as viruses, malware, and unauthorized access, but also methods of stealing information, such as phishing, shoulder hacking, and electromagnetic wave eavesdropping. Thus, security incidents tend to diversify, and it is therefore important to consider physical countermeasures and psychological countermeasures other than the cyber security countermeasures typically taken. In this paper, in addition to the current cyber security countermeasures, we propose new multi-layer defense security countermeasures taking into consideration non-cyber security countermeasures that reflect physical viewpoints and psychological viewpoints. Specifically, we propose the concept of multi-layer defense security countermeasures based on dynamic reconfiguration multi-perimeter lines. Furthermore, a desktop simulation is performed with TPO (time, place, occasion) conditions in the office as specific perimeter lines, and the effectiveness of the concept is clarified. This contributes to the construction of a new paradigm of information security management in the digital transformation era.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Japan Network Security Association: Survey Report on Information Security Incidents in 2018. http://www.jnsa.org/result/incident/. (in Japanese)
The Finance: Latest cyber attack and security countermeasures summary. https://thefinance.jp/fintech/150722. (in Japanese)
McAfee Blog: 20 Types of Cyber Attacks You Should Know to Protect Your Organization. https://blogs.mcafee.jp/cyber-attack-type-to-know. (in Japanese)
McAfee Blog: Why is it multilayer defense? Strongest security countermeasures that make a risk the minimum. https://blogs.mcafee.jp/defense-in-depth-multilayer-protection. (in Japanese)
Cyber security.com: What is social engineering? Consider countermeasures from specific methods. https://cybersecurity-jp.com/cyber-terrorism/14431. (in Japanese)
Tanimoto, S.: New paradigm of information security management in the digital transformation era, Keynote3. In: Proceedings of the 12th International Conference on Project Management (ProMAC2018), The Society of Project Management, Bangkok, pp. 45–76 (2018)
MIC: 2017 version information communication white paper. http://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h29/index.html. (in Japanese)
Canon: Security solution site’ Structure of the multilayer defense read and solved by illustration. https://www.canon-sas.co.jp/portal/security/securityinformation/deffences.html. (in Japanese)
Hoshi, T., et al.: Cyber attacker’s behavior considerations for Defense in Depth implementation, IPSJ SIG Technical reports, 2015-CSEC-71, no. 2 (2015). (in Japanese)
Moon, D., et al.: MLDS: multi-layer defense system for preventing advanced persistent threats. Symmetry 6, 997–1010 (2014). https://doi.org/10.3390/sym6040997
Elhaj, M.M.K., et al.: A multi-layer network defense system using artificial immune system. In: 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp. 232–236 (2013)
Wang, X., et al.: A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Secur. 7(4), 243–263 (2008). https://doi.org/10.1007/s10207-007-0042-x
Dasgupta, D.: Immuno-inspired autonomic system for cyber defense. Inf. Secur. Tech. Rep. 12(4), 235–241 (2007)
MONOist: How to protect a control system: “multilayer defense” and “status recognition”. http://monoist.atmarkit.co.jp/mn/articles/1403/04/news005.html. (in Japanese)
Yoneda, S., et al.: A study of dynamic cooperation method between multi-clouds based on TPO conditions. IEICE Trans. Inf. Syst. (Jpn. Ed.) J99-D(10), 1045–1049 (2016)
Acknowledgments
This work was supported by JSPS KAKENHI Grant Number JP 19H04098.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tanimoto, S. et al. (2020). Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines. In: Barolli, L., Nishino, H., Enokido, T., Takizawa, M. (eds) Advances in Networked-based Information Systems. NBiS - 2019 2019. Advances in Intelligent Systems and Computing, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-030-29029-0_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-29029-0_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29028-3
Online ISBN: 978-3-030-29029-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)