Automating environmental vulnerability analysis for network services

被引:0
|
作者
Koutras, Dimitris [1 ]
Grigoriadis, Christos [1 ]
Papadopoullos, Michalis [2 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Census SA, Athens, Greece
来源
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022) | 2022年
关键词
Communication protocols; Network security ontology; CVSS environmental score; SECURITY;
D O I
10.1109/ISCC55528.2022.9912946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to propose a framework in order to automate the environmental vulnerability assessment of communication protocols and networked services in operational environments. Initially, a network security ontology is defined, to model the environmental characteristics related with the current security status of available communication protocols channels within an examined infrastructure. The functionality of this infrastructure is presented by an ontology. All active communication services are initially identified and enumerated using a combination of different information gathering tools. Then by combining passive scanning and active security analysis tools each active communication service is assessed to output an environmental security score. This score may be utilized in vulnerability scoring systems such as CVSS, to properly adjust relevant scores and to identify implementation or configuration weaknesses in real environments. By using a test environment that involves various networks and communication protocols, we validate the proposed framework and we provide concrete examples for popular communication protocols.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Community Network with Integrated Services
    Wu, Z
    Wang, J
    Zhang, H
    COMPUTATIONAL SCIENCE - ICCS 2003, PT II, PROCEEDINGS, 2003, 2658 : 46 - 53
  • [22] Sparse rail network robustness analysis: Functional vulnerability levels of accidents resulting from human errors
    Khademi, Navid
    Bababeik, Mostafa
    Fani, Amirhossein
    JOURNAL OF SAFETY SCIENCE AND RESILIENCE, 2021, 2 (03): : 111 - 123
  • [23] Docker ecosystem - Vulnerability Analysis
    Martin, A.
    Raponi, S.
    Combe, T.
    Di Pietro, R.
    COMPUTER COMMUNICATIONS, 2018, 122 : 30 - 43
  • [24] Vulnerability Assessment for Coupled Network Consisting of Power Grid and EV Traffic Network
    Liu, Nian
    Hu, Xuejun
    Ma, Li
    Yu, Xinghuo
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (01) : 589 - 598
  • [25] Vulnerability assessment of services deployed in internet of things based smart cities
    Belghith, Aymen
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (02) : 164 - 174
  • [26] Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
    White, Ruffin
    Caiazza, Gianluca
    Jiang, Chenxu
    Ou, Xinyue
    Yang, Zhiyue
    Cortesi, Agostino
    Christensen, Henrik
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, : 57 - 66
  • [27] The application of neural network for software vulnerability detection: a review
    Zhu, Yuhui
    Lin, Guanjun
    Song, Lipeng
    Zhang, Jun
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (02) : 1279 - 1301
  • [28] Application of Battery Energy Storage for Network Vulnerability Mitigation
    Moeini, A.
    Kamwa, I.
    de Montigny, M.
    Lenoir, L.
    2016 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2016,
  • [29] Platoon Vulnerability due to Network Topology and Targeted Vehicle
    Hendrix, Constance
    Bloom, Gedare
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 771 - 776
  • [30] Analytics and measuring the vulnerability of communities for complex network security
    Jouyban, Morteza
    Hosseini, Soodeh
    INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS, 2024,