Automating environmental vulnerability analysis for network services

被引:0
|
作者
Koutras, Dimitris [1 ]
Grigoriadis, Christos [1 ]
Papadopoullos, Michalis [2 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Census SA, Athens, Greece
来源
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022) | 2022年
关键词
Communication protocols; Network security ontology; CVSS environmental score; SECURITY;
D O I
10.1109/ISCC55528.2022.9912946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to propose a framework in order to automate the environmental vulnerability assessment of communication protocols and networked services in operational environments. Initially, a network security ontology is defined, to model the environmental characteristics related with the current security status of available communication protocols channels within an examined infrastructure. The functionality of this infrastructure is presented by an ontology. All active communication services are initially identified and enumerated using a combination of different information gathering tools. Then by combining passive scanning and active security analysis tools each active communication service is assessed to output an environmental security score. This score may be utilized in vulnerability scoring systems such as CVSS, to properly adjust relevant scores and to identify implementation or configuration weaknesses in real environments. By using a test environment that involves various networks and communication protocols, we validate the proposed framework and we provide concrete examples for popular communication protocols.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Automating analysis
    Adey, Robert
    Trevelyan, John
    CIME. Computers in mechanical engineering, 1988, 7 (02): : 46 - 51
  • [42] Review on vulnerability analysis of power distribution network
    Yang, Li
    Teh, Jiashen
    ELECTRIC POWER SYSTEMS RESEARCH, 2023, 224
  • [43] Vulnerability Analysis of Network Scanning on SCADA Systems
    Coffey, Kyle
    Smith, Richard
    Maglaras, Leandros
    Janicke, Helge
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [44] Vulnus: Visual Vulnerability Analysis for Network Security
    Angelini, Marco
    Blasilli, Graziano
    Catarci, Tiziana
    Lenti, Simone
    Santucci, Giuseppe
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2019, 25 (01) : 183 - 192
  • [45] Integrating vulnerability analysis in transit network design
    Laskaris, Georgios
    Iliopoulou, Christina
    Kepaptsoglou, Konstantinos
    PUBLIC TRANSPORT, 2025,
  • [46] Measuring Road Network Vulnerability with Sensitivity Analysis
    Leng Jun-qiang
    Yang Long-hai
    Liu, Wei-yi
    Lin Zhao
    PLOS ONE, 2017, 12 (01):
  • [47] Lexicographical problem of the analysis of the vulnerability of a multicommodity network
    Nazarova, IA
    JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2003, 42 (05) : 778 - 789
  • [48] Vulnerability Analysis of Bangladesh Power System Network
    Al Hasnain, Fahim
    Chowdhury, Atique Mahmud A. H.
    2016 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (ICECE), 2016, : 393 - 395
  • [49] A Novel Approach for Network Vulnerability Analysis in IIoT
    Sudhakar, K.
    Senthilkumar, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 263 - 277
  • [50] Importance and exposure in road network vulnerability analysis
    Jenelius, Erik
    Petersen, Tom
    Mattsson, Lars-Goran
    TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2006, 40 (07) : 537 - 560