Automating environmental vulnerability analysis for network services

被引:0
|
作者
Koutras, Dimitris [1 ]
Grigoriadis, Christos [1 ]
Papadopoullos, Michalis [2 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Census SA, Athens, Greece
关键词
Communication protocols; Network security ontology; CVSS environmental score; SECURITY;
D O I
10.1109/ISCC55528.2022.9912946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to propose a framework in order to automate the environmental vulnerability assessment of communication protocols and networked services in operational environments. Initially, a network security ontology is defined, to model the environmental characteristics related with the current security status of available communication protocols channels within an examined infrastructure. The functionality of this infrastructure is presented by an ontology. All active communication services are initially identified and enumerated using a combination of different information gathering tools. Then by combining passive scanning and active security analysis tools each active communication service is assessed to output an environmental security score. This score may be utilized in vulnerability scoring systems such as CVSS, to properly adjust relevant scores and to identify implementation or configuration weaknesses in real environments. By using a test environment that involves various networks and communication protocols, we validate the proposed framework and we provide concrete examples for popular communication protocols.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Automating probabilistic environmental decision analysis
    Jennings, A.A.
    Nagarkar, P.A.
    Environmental Software, 10 (04):
  • [2] Automating probabilistic environmental decision analysis
    Jennings, AA
    NAgarkar, PA
    ENVIRONMENTAL SOFTWARE, 1995, 10 (04): : 251 - 262
  • [3] Automating network meta-analysis
    van Valkenhoef, Gert
    Lu, Guobing
    de Brock, Bert
    Hillege, Hans
    Ades, A. E.
    Welton, Nicky J.
    RESEARCH SYNTHESIS METHODS, 2012, 3 (04) : 285 - 299
  • [4] Automating network heuristic design and analysis
    Agarwal, Anup
    Arun, Venkat
    Ray, Devdeep
    Martins, Ruben
    Seshan, Srinivasan
    THE 21ST ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2022, 2022, : 8 - 16
  • [5] Network vulnerability analysis
    Skaggs, B
    Blackburn, B
    Manes, G
    Shenoi, S
    2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2002, : 493 - 495
  • [6] A conceptual model for automating spatial network analysis
    Scheider, Simon
    de Jong, Tom
    TRANSACTIONS IN GIS, 2022, 26 (01) : 421 - 458
  • [7] Automating workflow in online water network analysis
    Arango, Idel Montalvo
    Deuerlein, Jochen
    Guth, Nicolai
    Meyer-Harries, Lea
    COMPUTING AND CONTROL FOR THE WATER INDUSTRY (CCWI2015): SHARING THE BEST PRACTICE IN WATER MANAGEMENT, 2015, 119 : 653 - 659
  • [8] Vulnerability Analysis of LTE Location Services
    Hofer, Mark
    McEachen, John
    Tummala, Murali
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 5162 - 5166
  • [9] A new methodology of analyzing security vulnerability for network services
    Song, Yong Ho
    Park, Jung Min
    Park, Yongsu
    Im, Eul Gyu
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 737 - 738
  • [10] Vulnerability Analysis of the Financial Network
    Khabazian, Aein
    Peng, Jiming
    MANAGEMENT SCIENCE, 2019, 65 (07) : 3302 - 3321