Automating environmental vulnerability analysis for network services

被引:0
|
作者
Koutras, Dimitris [1 ]
Grigoriadis, Christos [1 ]
Papadopoullos, Michalis [2 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Census SA, Athens, Greece
来源
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022) | 2022年
关键词
Communication protocols; Network security ontology; CVSS environmental score; SECURITY;
D O I
10.1109/ISCC55528.2022.9912946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to propose a framework in order to automate the environmental vulnerability assessment of communication protocols and networked services in operational environments. Initially, a network security ontology is defined, to model the environmental characteristics related with the current security status of available communication protocols channels within an examined infrastructure. The functionality of this infrastructure is presented by an ontology. All active communication services are initially identified and enumerated using a combination of different information gathering tools. Then by combining passive scanning and active security analysis tools each active communication service is assessed to output an environmental security score. This score may be utilized in vulnerability scoring systems such as CVSS, to properly adjust relevant scores and to identify implementation or configuration weaknesses in real environments. By using a test environment that involves various networks and communication protocols, we validate the proposed framework and we provide concrete examples for popular communication protocols.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Vulnerability analysis of power communication network
    Fan, Bing
    Tang, Liangrui
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2014, 34 (07): : 1191 - 1197
  • [22] Vulnerability modelling for the analysis of network attacks
    Maggi, Paolo
    Pozza, Davide
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 15 - 22
  • [23] A Methodological Overview of Network Vulnerability Analysis
    Murray, Alan T.
    Matisziw, Timothy C.
    Grubesic, Tony H.
    GROWTH AND CHANGE, 2008, 39 (04) : 573 - 592
  • [24] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, T. Y.
    Kuo, Fei-Ching
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 189 - +
  • [25] Vulnerability Analysis of the Optical Network NMS
    Ma, Juntao
    Zhang, Lei
    Zhang, Shaokun
    Yao, Xinlei
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1185 - 1187
  • [26] Computational complexity of network vulnerability analysis
    Berberler, Murat Ersen
    ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA, 2022, 14 (02) : 199 - 207
  • [27] Vulnerability Analysis on the Cloud Network Topology
    Chen, Ke
    Zhang, Hua
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3007 - 3012
  • [28] Vulnerability Analysis of Intelligent Network System
    Yan, Danfeng
    Yang, Fangchun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 282 - 285
  • [29] Vulnerability analysis of critical infrastructure network
    Kizhakkedath, A.
    Tai, K.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 35
  • [30] AN EXERCISE IN AUTOMATING SEISMIC RECORD ANALYSIS AND NETWORK BULLETIN PRODUCTION
    RUUD, BO
    LINDHOLM, CD
    HUSEBYE, ES
    BULLETIN OF THE SEISMOLOGICAL SOCIETY OF AMERICA, 1993, 83 (03) : 660 - 679