skip to main content
10.1145/2994475.2994479acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

Published:24 October 2016Publication History

ABSTRACT

As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.

References

  1. J. Bau, E. Bursztein, D. Gupta, and J. Mitchell. State of the art: Automated black-box web application vulnerability testing. In 2010 IEEE Symposium on Security and Privacy, pages 332--345, May 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Bou-Harb, M. Debbabi, and C. Assi. Cyber scanning: a comprehensive survey. Communications Surveys & Tutorials, IEEE, 16(3):1496--1519, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  3. B. Boyter, R. Engelbach, and R. Taylor. System and method for network security scanning, Nov. 13 2003. US Patent App. 10/249,666.Google ScholarGoogle Scholar
  4. S. Branigan, H. Burch, B. Cheswick, and F. Wojcik. What can you do with traceroute? IEEE Internet Computing, 5(5):96--, Sep 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Bray. The JavaScript Object Notation (JSON) Data Interchange Format. RFC 7159, Internet Engineering Task Force, 2014.Google ScholarGoogle Scholar
  6. R. A. Burkhard. Learning from architects: the difference between knowledge visualization and information visualization. In Information Visualisation, 2004. IV 2004. Proceedings. Eighth International Conference on, pages 519--524, July 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Carriere and R. Kazman. Research report. interacting with huge hierarchies: beyond cone trees. In Information Visualization, 1995. Proceedings., pages 74--81, Oct 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Chatzimisios. Security issues and vulnerabilities of the snmp protocol. In 1st International Conference on Electrical and Electronics Engineering, pages 74--77, 2004.Google ScholarGoogle Scholar
  9. F. Cheng, S. Roschke, and C. Meinel. An integrated network scanning tool for attack graph construction. In Advances in Grid and Pervasive Computing, pages 138--147. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Convery and B. Trudel. Cisco safe: A security blueprint for enterprise networks. Technical report, Cisco Systems, 2000.Google ScholarGoogle Scholar
  11. V. Fuller and T. Li. Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan. RFC 4632, Internet Engineering Task Force, 2006.Google ScholarGoogle Scholar
  12. S. Grivet, D. Auber, P. J. Domenger, and G. Melancon. Computer Vision and Graphics: International Conference, ICCVG 2004, Warsaw, Poland, September 2004, Proceedings, chapter BUBBLE TREE DRAWING ALGORITHM, pages 633--641. Springer Netherlands, Dordrecht, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  13. K. Ingols, R. Lippmann, and K. Piwowarski. Practical attack graph generation for network defense. In 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pages 121--130, Dec 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. J. Jankun-Kelly and K.-L. Ma. Moiregraphs: radial focus+context visualization and interaction for graphs with visual nodes. In Information Visualization, 2003. INFOVIS 2003. IEEE Symposium on, pages 59--66, Oct 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Johnson and B. Shneiderman. Tree-maps: a space-filling approach to the visualization of hierarchical information structures. In Visualization, 1991. Visualization '91, Proceedings., IEEE Conference on, pages 284--291, Oct 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Koc and A. U. Tansel. A survey of version control systems. In The 2nd International Conference on Engineering and Meta-Engineering: ICEME 2011, Orlando, 2011. International Institute of Informatics and Systemics.Google ScholarGoogle Scholar
  17. C.-C. Lin and H.-C. Yen. Graph Drawing: 13th International Symposium, GD 2005, Limerick, Ireland, September 12--14, 2005. Revised Papers, chapter On Balloon Drawings of Rooted Trees, pages 285--296. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Liu, Y. Agam, J. R. Madsen, and G. Kreiman. Timing, timing, timing: Fast decoding of object information from intracranial field potentials in human visual cortex. Neuron, 62(2):281 -- 290, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  19. G. Lyon. Nmap Network Scanning: Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure.Com, LLC, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Membrey, E. Plugge, and D. Hawkins. The definitive guide to MongoDB: the noSQL database for cloud and desktop computing. Apress, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Mirkovic and P. Reiher. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2):39--53, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Muelder, K.-L. Ma, and T. Bartoletti. Interactive visualization for network and port scan detection. In Recent advances in intrusion detection, pages 265--283. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Orebaugh and B. Pinkard. Nmap in the enterprise: your guide to network scanning. Syngress, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Phillips and L. P. Swiler. A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms, pages 71--79. ACM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. E. M. Reingold and J. S. Tilford. Tidier drawings of trees. IEEE Transactions on Software Engineering, SE-7(2):223--228, March 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. N. B. Ruparelia. The history of version control. ACM SIGSOFT Software Engineering Notes, 35(1):5--9, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. A. Shelly. Using a web server test bed to analyze the limitations of web application vulnerability scanners. Master's thesis, Virginia Polytechnic Institute and State University, 2010.Google ScholarGoogle Scholar
  28. M. Ward, G. G. Grinstein, and D. Keim. Interactive data visualization : foundations, techniques, and applications. CRC Press, Boca Raton, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. K. Wong and N. Lam. Managing and querying multi-version xml data with update logging. In Proceedings of the 2002 ACM symposium on Document engineering, pages 74--81. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SafeConfig '16: Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense
        October 2016
        130 pages
        ISBN:9781450345668
        DOI:10.1145/2994475

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 October 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SafeConfig '16 Paper Acceptance Rate6of13submissions,46%Overall Acceptance Rate22of61submissions,36%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA
      • Article Metrics

        • Downloads (Last 12 months)14
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader