Automating environmental vulnerability analysis for network services

被引:0
|
作者
Koutras, Dimitris [1 ]
Grigoriadis, Christos [1 ]
Papadopoullos, Michalis [2 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Census SA, Athens, Greece
来源
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022) | 2022年
关键词
Communication protocols; Network security ontology; CVSS environmental score; SECURITY;
D O I
10.1109/ISCC55528.2022.9912946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to propose a framework in order to automate the environmental vulnerability assessment of communication protocols and networked services in operational environments. Initially, a network security ontology is defined, to model the environmental characteristics related with the current security status of available communication protocols channels within an examined infrastructure. The functionality of this infrastructure is presented by an ontology. All active communication services are initially identified and enumerated using a combination of different information gathering tools. Then by combining passive scanning and active security analysis tools each active communication service is assessed to output an environmental security score. This score may be utilized in vulnerability scoring systems such as CVSS, to properly adjust relevant scores and to identify implementation or configuration weaknesses in real environments. By using a test environment that involves various networks and communication protocols, we validate the proposed framework and we provide concrete examples for popular communication protocols.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Automating Vulnerability Management in the Software Development Lifecycle
    Franca, Horacio L.
    Teixeira, Cesar
    laranjeiro, Nuno
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 188 - 190
  • [2] Intelligent Platform for Automating Vulnerability Detection in Web Applications
    Moreira, Diogo
    Seara, Joao Pedro
    Pavia, Joao Pedro
    Serrao, Carlos
    ELECTRONICS, 2025, 14 (01):
  • [3] A Novel Approach for Network Vulnerability Analysis in IIoT
    Sudhakar, K.
    Senthilkumar, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 263 - 277
  • [4] Automating Mitigation of Amplification Attacks in NFV Services
    Repetto, Matteo
    Bruno, Gianmarco
    Yusupov, Jalolliddin
    Lamanna, Guerino
    Ertl, Benjamin
    Carrega, Alessandro
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2382 - 2396
  • [5] Vulnerability analysis of a natural gas pipeline network based on network flow
    Wang, WuChang
    Zhang, Yi
    Li, YuXing
    Liu, Chengsong
    Han, Shiying
    INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING, 2020, 188
  • [6] Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
    Ham, You Joung
    Lee, Hyung-Woo
    2013 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2013, : 393 - 398
  • [7] Model-based vulnerability analysis of IMS network
    Wang, Dong
    Liu, Chen
    Journal of Networks, 2009, 4 (04) : 254 - 262
  • [8] Automating Root-Cause Analysis of Network Anomalies using Frequent Itemset Mining
    Paredes-Oliva, Ignasi
    Dimitropoulos, Xenofontas
    Molina, Maurizio
    Barlet-Ros, Pere
    Brauckhoff, Daniela
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 467 - 468
  • [9] A systematic framework of vulnerability analysis of a natural gas pipeline network
    Su, Huai
    Zio, Enrico
    Zhang, Jinjun
    Li, Xueyi
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 175 : 79 - 91
  • [10] Automating the Assessment of Network Security in Higher Education
    Palmer, Neville
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 141 - 146