Automating environmental vulnerability analysis for network services

被引:0
作者
Koutras, Dimitris [1 ]
Grigoriadis, Christos [1 ]
Papadopoullos, Michalis [2 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Census SA, Athens, Greece
来源
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022) | 2022年
关键词
Communication protocols; Network security ontology; CVSS environmental score; SECURITY;
D O I
10.1109/ISCC55528.2022.9912946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to propose a framework in order to automate the environmental vulnerability assessment of communication protocols and networked services in operational environments. Initially, a network security ontology is defined, to model the environmental characteristics related with the current security status of available communication protocols channels within an examined infrastructure. The functionality of this infrastructure is presented by an ontology. All active communication services are initially identified and enumerated using a combination of different information gathering tools. Then by combining passive scanning and active security analysis tools each active communication service is assessed to output an environmental security score. This score may be utilized in vulnerability scoring systems such as CVSS, to properly adjust relevant scores and to identify implementation or configuration weaknesses in real environments. By using a test environment that involves various networks and communication protocols, we validate the proposed framework and we provide concrete examples for popular communication protocols.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Vulnerability Analysis and Security Modeling of MODBUS
    Kwon, Taeyean
    Lee, Jaehoon
    Yi, Okyeon
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2246 - 2251
  • [32] Vulnerability analysis of GPS receiver software
    Gonzalez, G. Mori
    Petrunin, I.
    Zbikowski, R.
    Voutsis, K.
    Moreno, R. Verdeguer
    2019 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2019,
  • [33] Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment
    Yevdokymenko, Maryna
    Shapovalova, Anastasiia
    Voloshchuk, Olena
    Carlsson, Anders
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 609 - 612
  • [34] A comparative study of neural network architectures for software vulnerability forecasting
    Cosma, Ovidiu
    Pop, Petrica C.
    Cosma, Laura
    LOGIC JOURNAL OF THE IGPL, 2024,
  • [35] A Vulnerability Risk Assessment Method Based on Heterogeneous Information Network
    Wang, Wenrui
    Shi, Fan
    Zhang, Min
    Xu, Chengxi
    Zheng, Jinghua
    IEEE ACCESS, 2020, 8 : 148315 - 148330
  • [36] Using the vulnerability information of computer systems to improve the network security
    Lai, Yeu-Pong
    Hsia, Po-Lun
    COMPUTER COMMUNICATIONS, 2007, 30 (09) : 2032 - 2047
  • [37] Network-Level Vulnerability Assessment of Synchrophasor Measurement Devices
    Swain, Kamakshi P.
    Sharma, Ankush
    Karkare, Amey
    Chakrabarti, Saikat
    Gryazina, Elena
    Terzija, Vladimir
    IEEE ACCESS, 2024, 12 : 72491 - 72503
  • [38] Payment for Environmental Services and Power in the Chamachan Watershed, Ecuador
    Rodriguez de Francisco, Jean Carlo
    Boelens, Rutgerd
    HUMAN ORGANIZATION, 2014, 73 (04) : 351 - 362
  • [39] Roles of the network in next generation IP services
    Tachimoto, S
    Hiramatsu, A
    Murakami, T
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 792 - 796
  • [40] OpenGate: Towards an open network services gateway
    Qi, Yaxuan
    He, Fei
    Wang, Xiang
    Chen, Xinming
    Xue, Yibo
    Li, Jun
    COMPUTER COMMUNICATIONS, 2011, 34 (02) : 200 - 208