Skip to main content
Erschienen in: Information Systems Frontiers 5/2008

01.11.2008

An OVAL-based active vulnerability assessment system for enterprise computer networks

verfasst von: Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan

Erschienen in: Information Systems Frontiers | Ausgabe 5/2008

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the security vulnerabilities. However, current vulnerability assessment methods may encounter the issues of high false positive rates, long computational time, and requirement of developing attack codes. Moreover, they are only capable of locating individual vulnerabilities on a single host without considering correlated effect of these vulnerabilities on a host or a section of network with the vulnerabilities possibly distributed among different hosts. To address these issues, an active vulnerability assessment system NetScope with C/S architecture is developed for evaluating computer network security based on open vulnerability assessment language instead of simulating attacks. The vulnerabilities and known attacks with their prerequisites and consequences are modeled based on predicate logic theory and are correlated so as to automatically construct potential attack paths with strong operation power of relational database management system. The testing results from a series of experiments show that this system has the advantages of a low false positive rate, short running periods, and little impact on the performance of audited systems and good scalability. The security vulnerabilities, undetectable if assessed individually in a network, are discovered without the need to simulate attacks. It is shown that the NetScope system is well suited for vulnerability assessment of large-scale computer networks such as campus networks and enterprise networks. Moreover, it can also be easily integrated with other security tools based on relational databases.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ammann, P., Wijesekera, D., & Kaushik, S. (2002). Scalable, graph-based network vulnerability analysis. Proceedings of 9th ACM Conference on Computer and Communication Security, Washington, D.C., USA. Ammann, P., Wijesekera, D., & Kaushik, S. (2002). Scalable, graph-based network vulnerability analysis. Proceedings of 9th ACM Conference on Computer and Communication Security, Washington, D.C., USA.
Zurück zum Zitat Baldwin, R. (1994). Kuang: Rule based security checking. Cambridge: MIT Technical Report, MIT Lab for Computer Science, Programming Systems Research Group. Baldwin, R. (1994). Kuang: Rule based security checking. Cambridge: MIT Technical Report, MIT Lab for Computer Science, Programming Systems Research Group.
Zurück zum Zitat Farmer, D., & Spafford, E. H. (1991). The cops security checker system. West Lafayette: Purdue University Technical report, CSD-TR-993. Farmer, D., & Spafford, E. H. (1991). The cops security checker system. West Lafayette: Purdue University Technical report, CSD-TR-993.
Zurück zum Zitat Fithen, W. L., Hernan, S. V., O’Rourke, P. F., et al. (2004). Formal modeling of vulnerabilities. Bell Labs Technical Journal, 8(4), 173–186.CrossRef Fithen, W. L., Hernan, S. V., O’Rourke, P. F., et al. (2004). Formal modeling of vulnerabilities. Bell Labs Technical Journal, 8(4), 173–186.CrossRef
Zurück zum Zitat Geng, S., Qu, W., & Zhang, L. (2001). Discrete mathematics pp. 34–56. Beijing: Tsinghua University Press. Geng, S., Qu, W., & Zhang, L. (2001). Discrete mathematics pp. 34–56. Beijing: Tsinghua University Press.
Zurück zum Zitat Hsu, C., & Wallace, W. (2007). An industrial network flow information integration model for supply chain management and intelligent transportation. Enterprise Information Systems, 1(3), 327–351.CrossRef Hsu, C., & Wallace, W. (2007). An industrial network flow information integration model for supply chain management and intelligent transportation. Enterprise Information Systems, 1(3), 327–351.CrossRef
Zurück zum Zitat Jajodia, S., Noel, S., & O’Berry, B. (2003). Topological analysis of network attack vulnerability. Managing cyber threats: Issues, approaches and challenges, chapter 5. Norwell: Kluwer Academic. Jajodia, S., Noel, S., & O’Berry, B. (2003). Topological analysis of network attack vulnerability. Managing cyber threats: Issues, approaches and challenges, chapter 5. Norwell: Kluwer Academic.
Zurück zum Zitat Kotenko, I. (2003). Active vulnerability assessment of computer networks by simulation of complex remote attacks. International Conference on Computer Networks and Mobile Computing, pp. 40–47, October 20–23, Shanghai, China. Kotenko, I. (2003). Active vulnerability assessment of computer networks by simulation of complex remote attacks. International Conference on Computer Networks and Mobile Computing, pp. 40–47, October 20–23, Shanghai, China.
Zurück zum Zitat Li, T., Feng, S., & Li, L. (2001). Information visualization for intelligent decision support systems. Knowledge-Based Systems, 14(5–6), 259–262.CrossRef Li, T., Feng, S., & Li, L. (2001). Information visualization for intelligent decision support systems. Knowledge-Based Systems, 14(5–6), 259–262.CrossRef
Zurück zum Zitat Martin, R. A. (2003). Integrating your information security vulnerability management capabilities through industry standards (CVE & OVAL). IEEE International Conference on Systems, Man and Cybernetics, 2, 1528–1533, October 5–8. Martin, R. A. (2003). Integrating your information security vulnerability management capabilities through industry standards (CVE & OVAL). IEEE International Conference on Systems, Man and Cybernetics, 2, 1528–1533, October 5–8.
Zurück zum Zitat Ning, P., & Cui, Y. (2002). An intrusion alert correlator based on prerequisites of intrusions. Raleigh: North Carolina State University Technical Report, TR-2002-01, Department of Computer Science. Ning, P., & Cui, Y. (2002). An intrusion alert correlator based on prerequisites of intrusions. Raleigh: North Carolina State University Technical Report, TR-2002-01, Department of Computer Science.
Zurück zum Zitat Phillips, C., & Swiler, L. P. (1998). A graph-based system for network-vulnerability analysis. NSPW ’98: Proceedings of the 1998 workshop on new security paradigms pp. 71–79. New York: ACM. Phillips, C., & Swiler, L. P. (1998). A graph-based system for network-vulnerability analysis. NSPW98: Proceedings of the 1998 workshop on new security paradigms pp. 71–79. New York: ACM.
Zurück zum Zitat Ramakrishnan, C. R., & Sekar, R. (2002). Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1), 189–209. Ramakrishnan, C. R., & Sekar, R. (2002). Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1), 189–209.
Zurück zum Zitat Ritchey, R., & Ammann, P. (2000). Using model checking to analyze network vulnerabilities. Proceedings of IEEE Symposium on Security and Privacy pp. 156–165. Oakland: IEEE. Ritchey, R., & Ammann, P. (2000). Using model checking to analyze network vulnerabilities. Proceedings of IEEE Symposium on Security and Privacy pp. 156–165. Oakland: IEEE.
Zurück zum Zitat Ritchey, R., Berry, B., & Noel, S. (2002). Representing TCP/IP connectivity for topological analysis of network security. The 18th Annual Computer Security Applications Conference, December 9–13,San Diego, CA, USA. Ritchey, R., Berry, B., & Noel, S. (2002). Representing TCP/IP connectivity for topological analysis of network security. The 18th Annual Computer Security Applications Conference, December 9–13,San Diego, CA, USA.
Zurück zum Zitat Russell, S., & Norvig, P. (2004). Artificial intelligence: a modern approach pp. 185–200. Upper Saddle River: Pearson Education. Russell, S., & Norvig, P. (2004). Artificial intelligence: a modern approach pp. 185–200. Upper Saddle River: Pearson Education.
Zurück zum Zitat Sheyner, O., Haines, J., Jha, S., et al. (2002). Automated generation and analysis of attack graphs (pp. 254–265). Proceedings of IEEE Symposium on Security and Privacy, May 12–15, Berkeley, CA, USA. Sheyner, O., Haines, J., Jha, S., et al. (2002). Automated generation and analysis of attack graphs (pp. 254–265). Proceedings of IEEE Symposium on Security and Privacy, May 12–15, Berkeley, CA, USA.
Zurück zum Zitat Swiler, L. P., Phillips, C., Ellis, D., et al. (2001). Computer-attack graph generation tool. DARPA Information Survivability Conference and Exposition (DISCEX II’01), 2, 307–321 Anaheim, CA, USA.CrossRef Swiler, L. P., Phillips, C., Ellis, D., et al. (2001). Computer-attack graph generation tool. DARPA Information Survivability Conference and Exposition (DISCEX II’01), 2, 307–321 Anaheim, CA, USA.CrossRef
Zurück zum Zitat Templeton, S. J., & Levitt, K. (2000). A requires/provides model for computer attacks (pp. 31–38). Proceedings of the 2000 Workshop On New Security Paradigms, Cork Ireland. Templeton, S. J., & Levitt, K. (2000). A requires/provides model for computer attacks (pp. 31–38). Proceedings of the 2000 Workshop On New Security Paradigms, Cork Ireland.
Zurück zum Zitat Zerkle, D., & Levitt, K. (1996). Netkuang—a multi-host configuration vulnerability checker. Proceedings of the 6th USENIX Security Symposium, San Jose, California, USA. Zerkle, D., & Levitt, K. (1996). Netkuanga multi-host configuration vulnerability checker. Proceedings of the 6th USENIX Security Symposium, San Jose, California, USA.
Metadaten
Titel
An OVAL-based active vulnerability assessment system for enterprise computer networks
verfasst von
Xiuzhen Chen
Qinghua Zheng
Xiaohong Guan
Publikationsdatum
01.11.2008
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 5/2008
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-008-9111-6

Weitere Artikel der Ausgabe 5/2008

Information Systems Frontiers 5/2008 Zur Ausgabe

Premium Partner