Abstract
Lately, a great number of new security tools have been developed to solve the problems of IP networks, but some doubts were raised about the efficiency of those systems. There are some techniques used to evaluate the vulnerabilities of a network, but their results are limited and few tools aim to facilitate and automate the evaluation of security network mechanisms. This article presents a network fault injection system especially created to test network security equipment, aiming to solve the inexistence of this type of tool and to fill the gap between packet injectors and vulnerability scanners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bace, R.: An Introduction to Intrusion Detection&Assessment, Scotts Valley: Infidel (1999)
Deraison, R.: Nessus Security Scanner (2000), http://www.nessus.org/ (December 2002)
Grimes, M.: Nemesis Packet Injection (2000), http://www.packetfactory.net/Projects/nemesis/ (December 2002)
Hsueh, M., Tsai, T.K., Iyer, R.K.: Fault Injection Techniques and Tools. Computer 30(04), 75–82 (1997)
McHugh, J., Christie, A., Allen, J.: Defending Yourself: The Role of Intrusion Detection Systems. IEEE Software Computer 17(5), 42–51 (2000)
Ricketts, M.: SendIP (2000), http://www.earth.li/projectpurple/progs/sendip.html (December 2002)
Sanfilippo, S.: Hping (2001), http://www.hping.org (December 2002)
Todd, B.: Security Auditor’s Research Assistant (1999), http://www-arc.com/sara/index.shtml (December 2002)
WorldWide Digital Security, Inc Security Administrator’s Integrated Network Tool (2000), http://www.wwdsi.com/saint/ (December 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herrmann Wanner, P.C., Weber, R.F. (2003). Fault Injection Tool for Network Security Evaluation. In: de Lemos, R., Weber, T.S., Camargo, J.B. (eds) Dependable Computing. LADC 2003. Lecture Notes in Computer Science, vol 2847. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45214-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-45214-0_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20224-0
Online ISBN: 978-3-540-45214-0
eBook Packages: Springer Book Archive