Abstract
Vulnerability detection and security level estimation are actual tasks of protecting computer networks. The paper considers the models and architectures of intelligent components intended for active analyzing computer network vulnerabilities and estimating its security level. The offered approach is based on simulation of computer attacks on different levels of detail and intended for implementation at various stages of computer network life cycle, including design and exploitation stages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CERT/CC Statistics (1988-2005), http://www.cert.org/stats/cert_stats.html
Chapman, C., Ward, S.: Project Risk Management: processes, techniques and insights. John Wiley, Chichester (2003)
Chi, S.-D., Park, J.S., Jung, K.-C., Lee, J.-S.: Network Security Modeling and Cyber Attack Simulation Methodology. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, p. 320. Springer, Heidelberg (2001)
Chirillo, J.: Hack Attacks Testing – How to Conduct Your Own Security Audit. Wiley Publishing, Chichester (2003)
Chung, M., Mukherjee, B., Olsson, R.A., Puketza, N.: Simulating Concurrent Intrusions for Testing Intrusion Detection Systems. In: Proc. of the 18th NISSC (1995)
Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. In: IEEE Symposium on Security and Privacy, Berkeley, CA (1999)
Dawkins, J., Campbell, C., Hale, J.: Modeling network attacks: Extending the attack tree paradigm. In: Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University (2002)
Goldman, R.P.: A Stochastic Model for Intrusions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, p. 199. Springer, Heidelberg (2002)
Gorodetski, V., Kotenko, I.: Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, p. 219. Springer, Heidelberg (2002)
Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M., Raghavendra, C.S.: Impact Analysis of Faults and Attacks in Large-Scale Networks. IEEE Security & Privacy (September/October 2003)
Henning, R.: Workshop on Information Security System Scoring and Ranking. Applied Computer Security Associates and The MITRE Corporation, Williamsburg (2001)
Iglun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering 21(3) (1995)
Jha, S., Sheyner, O., Wing, J.: Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, Carnegie Mellon University (2002)
Jha, S., Linger, R., Longstaff, T., Wing, J.: Survivability Analysis of Network Specifications. In: Intern. Conference on Dependable Systems and Networks. IEEE CS Press, Los Alamitos (2000)
Kemmerer, R.A., Vigna, G.: NetSTAT: A network-based intrusion detection approach. In: 14th Annual Computer Security Applications Conference, Scottsdale, Arizona (1998)
Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection. Technical Report CSDTR 94 013. Purdue University (1994)
Lye, K., Wing, J.: Game Strategies in Network Security. International Journal of Information Security (February 2005)
McNab, C.: Network Security Assessment. O’Reilly Media, Inc., Sebastopol (2004)
Moitra, S.D., Konda, S.L.: A Simulation Model for Managing Survivability of Networked Information Systems, Technical Report CMU/SEI-2000-TR-020 (December 2000)
Moore, A.P., Ellison, R.J., Linger, R.C.: Attack Modeling for Information Security and Survivability. Technical Note CMU/SEI-2001-TN-001 (March 2001)
Nessus Network Auditing. Renaud Deraison. Syngress Publishing, Inc. (2004)
Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-Based Evaluation: From Dependability to Security. IEEE Transactions on Dependable and Secure Computing 1(1) (2004)
Ortalo, R., Dewarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. on Software Engineering 25(5) (1999)
OSVDB: The Open Source Vulnerability Database, http://www.osvdb.org/
Peltier, T.R.: Information security risk analysis. Auerbach (2001)
Peltier, T.R., Peltier, J., Blackley, J.A.: Managing a Network Vulnerability Assessment. Auerbach Publications (2003)
POSITIF Project leaflet (2004), http://www.positif.org/idissemination.html
RiskWatch users manual, http://www.riskwatch.com
Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: Proceedings of IEEE Computer Society Symposium on Security and Privacy (2000)
Rohse, M.: Vulnerability naming schemes and description languages: CVE, Bugtraq, AVDL and VulnXML. SANS GSEC PRACTICAL (2003)
Sademies, A.: Process Approach to Information Security Metrics in Finnish Industry and State Institutions. VTT Electronics, Espoo. VTT Publications (2004)
Schneier, B.: Attack Trees. Dr. Dobb’s Journal 12 (1999)
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proc. of the IEEE Symposium on Security and Privacy (2002)
Singh, S., Lyons, J., Nicol, D.M.: Fast Model-based Penetration Testing. In: Proceedings of the 2004 Winter Simulation Conference (2004)
Steffan, J., Schumacher, M.: Collaborative Attack Modeling. In: 17th ACM Symposium on Applied Computing (SAC 2002), Madrid, Spain (2002)
Stewart, A.J.: Distributed Metastasis: A Computer Network Penetration Methodology. Phrack Magazine 9(55) (1999)
Storms, A.: Using vulnerability assessment tools to develop an OCTAVE Risk Profile. SANS Institute, http://www.sans.org
Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: DISCEX 2001 (2001)
Templeton, S.J., Levitt, K.: A Requires/Provides Model for Computer Attacks. In: Proc. of the New Security Paradigms Workshop (2000)
Yuill, J., Wu, F., Settle, J., Gong, F.: Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks (34) (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kotenko, I., Stepashkin, M. (2005). Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_24
Download citation
DOI: https://doi.org/10.1007/11560326_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)