A Review on Zero Day Attack Safety Using Different Scenarios
|
|
|
- Vivien Lloyd
- 9 years ago
- Views:
Transcription
1 Available online European Journal of Advances in Engineering and Technology, 2015, 2(1): Review Article ISSN: X A Review on Zero Day Attack Safety Using Different Scenarios Harshpal R Gosavi and Anant M Bagade Department of Information Technology, Pune Institute of Computer Technology (PICT), Pune, India [email protected] ABSTRACT A zero day attack is the type of attack where people make use of flaw in the software developed by various companies. There is no patch available so it is difficult to tackle such types of attacks even when developers of the company are known to this. For any network such attacks can be possible only way to get through this is to prevent such types of attack. If the network administrator knows that how many such attacks can be possible then he can make some changes in his administrator rights. It is found that more than five thousands vulnerabilities are occurring per day. We are proposing complete novel scenario which can lead to the counting of such vulnerability in very efficient way. Using this method we can easily provide option of network hardening so as to prevent it from unknown vulnerability. Key words: administrator, patch, vulnerability, zero day, network hardening. INTRODUCTION Now a day, in any network immeasurable vulnerabilities could be found in services which are working on various components of the system. There are few methods of the security as shown below. Fig. 1 Types of security methods Encryption Encryption is converting useful data into such format so that nobody can understand it. This has four different methods. Wireless Encryption (WE) Wireless Encryption is done on wireless network. Various wireless algorithms are developed to implement this encryption. Wired Equivalent Privacy (WEP) This also called as Wireless Encryption Protocol. This is the method which states that malicious link should not use. Wi-Fi Protected Access (WPA) This generally used to encrypt the secure and source traffic by efficient. 30
2 Pre-shared Key (PSK) In this method the sharing key will be done in the two different machines and security is provided. User ID Here it uses the Username and ID to identify the permitted user and according to it he has the rights to access. Authentication Authentication has three types. 1) One Factor 2) Two Factor 3) Three Factor. In one factor user knows something to access the network. In two factor anything that user has to physically access the network. In three factor something that user needs like retina scan or finger prints. Firewall Firewall blocks unwanted packets and it also analyze the network traffic. It checks incoming packets and give authority that to allow this packets or not. Physical Security When somebody breaks something by going physically there. Web applications basically deals with such problems which needs services to run those applications. Web application with injection flaw is widely occurring in the network. Researcher wants to find it from many years to understand it. Existed Systems Common Weakness Scoring System (CWSS) is the system where it counts the known vulnerability but say very little about the unknown. Sometimes it was recommended that to merge this into firewall so as client side would not need external security. Modeling network graph can be way to demolish it and has been tested over hosts to check its compatibility with network [1]. Even if many methods are available to lower down this attacks but no method nearly predict the exact risk of the threat which are acting on the network [2]. NetSPA was one of the tool which uses attack graph to model this threats [3]. It scans the network for the vulnerability and from the preferable input it draws the attack graph to know that vulnerability present over the network [3]. Topological Vulnerability Analysis (TVA) is one of the attack prevention methods which is powerful [4]. This vulnerability can be depending on each other of the different network system. User sometimes even cannot know that how this thing are happening as there is large abstraction in the given applications. In this approach the network is configured and tested for the sequences of the vulnerability. This is shown in the Fig. 2. Vulnerability Discovery Model is also one of the models to detect count of the vulnerability in any software [5]. So there is always one question can arise that is there any database for measuring the risk of attacks [2]. The attacks related to the exploitation of the vulnerability are common but to make patch of such vulnerability is difficult and cost effective. Exploit Simulation Engine Threat Reporting Attack graph visualization Protection Fig. 2 Process of topological vulnerability analysis Zero Day Security Models k- Zero Day Risk Assessing Vulnerability Discovery Metrics Market Exploit Fig. 3 Zero day Security Methods 31
3 APPROACHES OF ZERO DAY MODEL The zero day safety comes under the firewall security methods. Firewall blocks the unknown packets which are always roaming in the corresponding network. For this type it is further divided into five types of security. It is shown in Fig 3. k-zero Day In this model, the various connected host are measured and different services related to it are detected [1]. The services in which vulnerability can be possible are to be found out. Such count is measured and then it is informed to the corresponding network administrator. The remote services are accessed remotely over the network. Fig. 4 Example of Zero day vulnerability As shown in the above fig 4. it is necessary to first make the sequences of the services and corresponding host to determine the distinctness and then it needs to find vulnerability possibilities in the services of those host. The host0 can attack on host1 to exploit vulnerability and to get into root. This vulnerability can again be exploited host2 to gain the access of its privileges. The ways provided to get rid of this is to make an attack graph[3]. It can be exploited like (0,F), (0,1) and then (0,2). It means for first set it is going from host 0 to Firewall. As soon as this services are known which can contain this vulnerability are counted. This metric can be applied to any network and then the administrator can take care of this by using different applications which can prevent further destruction because of these vulnerabilities [1]. Risk Assessment The risk assessment can be done using the vulnerability in the network whether they exists in large or small quantity [2]. Its functions are based on probability of nodes in the network. Each network node is checked that existing node is true or false for giving access or privileges to another node. Using the probability theory the sample space of a node is calculated and then probability is calculated. In this way a risk of the network can be determined and vulnerabilities can be minimized by prior knowledge of software applications by this node. There are many other factors that are affecting the risk of the network and thus it is very important to analyze the risk of the network. Vulnerability Discovery Variables Literature review revels that there are four types of variables for the web applications. a) Types of the threat and corresponding attacks. b) People are aware of the vulnerability or not and whether it is in large quantity or not. c) Security of vulnerability. d) The mechanisms for such questions. These are the basic variables for the web applications but there are many types of mechanisms in the survey to discover the vulnerability [5]. Some of them can be Expert Decisions, Construction of maker and scoring information are widely used methods for discovering such zero day vulnerabilities. Vulnerability Metric by Actual Attacks This basically relies on the concept of VEA-bility. V- Vulnerability E- Exploitability A- Attackability The metric would be done on this three parameters. By using CVSS impact they aggregate the system by individual and all scores are calculated according to its attack graph [1] [3]. The basic equation made by their survey is as follows. A(System) = 10 x attack paths paths From above equation if we know the attack paths and network paths then we can calculate the possible attacks in that network. 32
4 Market Zero day Exploit In the current industries zero days gaining so much popularity thus it is necessary to keep this away from the companies current software because it may leads to the large disaster of the company s assets. There are many arguments like for and against are best explained in corresponding paper. Also there are some tools for checking its availability; it can be named as Cobra effect on credit card and Cobra effect on industry [3]. This approximate includes 15 such effect which are related to avoiding this effects. Even search is a lot but solutions seems to be different because no availability of the definitions of such flaws. The comparison of the markets vulnerability can lead to the efficient knowledge of the existing threats. From this it can be possible to identify the solutions related to the corresponding vulnerability [6]. Table -1 Comparison of Different Methods Method Count Time Efficiency k- Zero day Count unknown attacks Fast Best Risk Assessment Count risk Slow Good Vulnerability metric Count by CVSS but not unknown Moderate Good Market Zero day Count is limited to industry Moderate Moderate PROPOSED APPROACH There are many flaws in the existing system so there is need of new system which tracks down the flaws in the existing system. Before proceeding it is necessary to know all the services are active on the network. The scenario proposed below is novel scenario and if we go through procedure in fig. 5 then it is easy to count the number of vulnerability possible in the network. Now let s see what is happening in each phase. Sequences Every service works differently as according to program that are written into it. Thus, make the different sequences of such services by using set theory. Example if host 1 can exploit the vulnerability on host 2 then in the matrix of n x n we will going to make corresponding field as 1(n is number of host). http Host ssh Firewall Sequences Modeling Computing Applying n Fig. 5 Proposed Scenario Count In the modelling, the sequences made in earlier stage are modelled to check the existence of vulnerability. In the first stage network model is to be prepared, it consist of all the information about the network and related routing connections. The connected systems are gathered together to get access and then kept for checking of each and every path of the services. Before checking it has to find that how much privilege it has given to the other systems of the network. Now concentrating on remote system to be check whether the remote systems contains such vulnerability or not. If there exist such vulnerability then it can leads to the exploitation of vulnerability in the destination host. Computing Computing is nothing but counting the number of vulnerabilities in the network by deriving various logic propositions rigorousness of the network is determined and vulnerabilities are kept aside. The assets related to it are taken away separately and attack graph tells the exact process of the services [3]. For the next phase determine safety for zero day upto the particular threshold by applying recursive methods. Its complexity will leads to the polynomial in size of zero day attack graph [3]. It means that whatever network assets are available it need to try that this assets would compromise the network upto certain threshold. There are many chances where value of k will become constant. The third phase consists of finding the shortest path via acyclic directed graph (DAG). As the remotely computer requires the privileges, same kind of zero day are arranged in a relation. Any algorithm can be applied to find out shortest path in the attack graph. It would check from node to node and from each node there will be edge for knowing the connections statistics. There should be checking of each node visited or not and the statistic of such visited node have to be considered. 33
5 Applying Here it shows the potential of the metric by applying it to the network hardening. It increases security and it can be done by changing some configuration. It also provides some solutions related to it so that security of the network will increase. This type of solutions could be valid or invalid thus only valid solutions would be taken into consideration. It takes care of the disabling services then in the network diversity it could be done by taking special care and by terminating each tree services. Counting Counting is process of making final attack graph and determines the number of zero day attacks. This would inform to the network administrator to change settings or disabling the services which are acting currently and making vulnerabilities in it [7]. RELATED WORK The Markov model was the model in which vulnerability identified according to the time and efforts. Currently all are taking efforts on making the attack graph which is little bit different kind to search the network security. The metric is varying day by day as the exploitation of the vulnerability is increasing. The concept of network hardening is currently stayed away but works also in the way to solve [7]. Empirical analysis has been done to know the actual effect of the attack [8]. The most of all are working on to provide security to particular applications but as the network sharing is increased everybody found that to work for the applications which are commonly used. The work was done only on one way to the system but it has to be done parallely. There are some tools need to be there to find it parallel this has been taken in account. Empirical study is aware of the vulnerability occur for the particular time period. Injections of attacks are generally considered as temporary task but it can be blocked by using solution of ant viruses sometimes [9]. The main thing is finding the location of an attacker so as to track such path via different locations [10]. Knowing the IP address of the system of an attacker it can be done but first it needs to find what was the path of the packet which was transmitted from the long distance. CONCLUSION This review paper presented novel security scenario for counting the zero day vulnerability and approaches of the zero day attack model. This approaches shows how this zero day can be handled in any given network which includes counting of unknown vulnerability through which we can improve the security. Future work is to develop different technologies for ranking zero day vulnerabilities. There are many situations where uncertain handling of inputs are not considered, this also includes in future work. REFERENCES [1] P Mell, K Scarfone and S Romanosky, Common Vulnerability Scoring System, IEEE Security and Privacy, 2006, vol. 4, no. 6, p [2] Davide Balzarotti, Mattia Monga and Sabrina Sicari, Assessing the Risk of Using Vulnerable Components, Springer Quality of Protection Advances in Information Security, 2006, 23, p [3] K Ingols, M Chu, R Lippmann, S Webster and S Boyer, Modern Attacks and Countermeasures Using Attack Graphs, IEEE Conf. on Computer Security Applications, 2009, p [4] S Jajodia, P Liu, V Swarup and C Wang, Topological Vulnerability Analysis: A Powerful New Approach for Attack Prevention, Detection and Response, Cyber Situational Awareness, 2010, p [5] S Egelman, C Herley and P C Van Oorschot, Market for Zero-Day Exploit: Ethic and Implications, Proceedings of the 2013 workshop on New Security Paradigms Workshop,2013, p [6] John Homer, Xinmin Qu and David Schmidt, A Sound and Practical Approach to Quantifying Security Risk in Enterprise s, peoplecisksuedu/~xou/publications/tr_homer_0809pdf, [7] L Wang, S Jajodia, A Singhal, P Cheng and S Noel, k-zero Day Safety: A Security Metric for Measuring the Risk of Unknown Vulnerabilities, IEEE Transaction on Dependable and Secure Computing, 2014, Vol.11, Issue1, p [8] M Ekstedt and H Holm, Empirical Analysis of System-level vulnerability metrics through actual attacks, IEEE Transactions on Dependable and Secure Computing,2012, Vol. 9, Issue 6, p [9] J Antunes, N Neves, MCorreia, P Verissimo and R Neves, Vulnerability Discovery with Attack Injection, IEEE Transaction on Software Engineering, 2010, Vol. 36, Issue 3, p [10] T Sommestad, H Holm and M Ekstedt, Effort Estimates for Vulnerability Discovery Projects, Proc 45 th Hawaii International Conference on System Sciences, 2012, p
A Novel Approach on Zero Day Attack Safety Using Different Scenarios
A Novel Approach on Zero Day Attack Safety Using Different Scenarios 1Shaik Yedulla Peer,2N. Mahesh, 3 R. Lakshmi Tulasi 2 Assist Professor, 3 Head of The Department [email protected] Abstract-A zero day
k-zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
k-zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks Lingyu Wang 1, Sushil Jajodia 2, Anoop Singhal 3, and Steven Noel 2 1 Concordia Institute for Information Systems Engineering,
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Metrics Suite for Enterprise-Level Attack Graph Analysis
Metrics Suite for Enterprise-Level Attack Graph Analysis Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Sushil Jajodia (PI), Steven Noel (co-pi) Metrics Suite for Enterprise-Level
A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL
Volume 3, No. 3, March 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL Tito Waluyo Purboyo *1,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH
Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Zero day attacks anatomy & countermeasures. By Cade Zvavanjanja Cybersecurity Strategist
Zero day attacks anatomy & countermeasures By Cade Zvavanjanja Cybersecurity Strategist Question? How do you secure against something Your security system can t capture, your experts don t know, your vendors
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Network Security and Risk Analysis Using Attack Graphs
Network Security and Risk Analysis Using Attack Graphs Anoop Singhal National Institute of Standards and Technology Coauthors: Lingyu Wang and Sushil Jajodia Concordia University George Mason University
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson Fellow, IEEE, Danfeng (Daphne) Yao, Member, IEEE
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
A Framework for Analysis A Network Vulnerability
A Framework for Analysis A Tito Waluyo Purboyo 1, Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia Abstract: administrators
A Cyber Attack Modeling and Impact Assessment Framework
2013 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum (Eds.) 2013 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication for
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
2012 31st International Symposium on Reliable Distributed Systems Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics Pengsu Cheng, Lingyu Wang, Sushil Jajodia and Anoop Singhal Concordia
A Multi-layer Tree Model for Enterprise Vulnerability Management
A Multi-layer Tree Model for Enterprise Vulnerability Management Bin Wu Southern Polytechnic State University Marietta, GA, USA [email protected] Andy Ju An Wang Southern Polytechnic State University Marietta,
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security PART 1 - COMPLIANCE STANDARDS PART 2 SECURITY IMPACT THEMES BUILD A MODEL THEMES MONITOR FOR FAILURE THEMES DEMONSTRATE
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
VEA-bility Analysis of Network Diversification
VEA-bility Analysis of Network Diversification Melanie Tupper Supervised by Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University [email protected] [email protected] August 31, 2007 Abstract:
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson, Danfeng (Daphne) Yao, Member, IEEE and Xinming
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
WLAN Authentication and Data Privacy
WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may
WLAN Information Security Best Practice Document
WLAN Information Security Best Practice Document Produced by FUNET led working group on wireless systems and mobility (MobileFunet) (WLAN security) Author: Wenche Backman Contributors: Ville Mattila/CSC
NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs Anoop Singhal Ximming Ou NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Statistical Analysis of Computer Network Security. Goran Kap and Dana Ali
Statistical Analysis of Computer Network Security Goran Kap and Dana Ali October 7, 2013 Abstract In this thesis it is shown how to measure the annual loss expectancy of computer networks due to the risk
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Simple Steps to Securing Your SSL VPN
Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Security and Vulnerability Issues in University Networks
, July 6-8, 2011, London, U.K. Security and Vulnerability Issues in University Networks Sanad Al Maskari, Dinesh Kumar Saini, Swati Y Raut and Lingraj A Hadimani Abstract The paper deals with security
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
A Novel Quantitative Approach For Measuring Network Security
A Novel Quantitative Approach For Measuring Network Security Mohammad Salim Ahmed [email protected] Ehab Al-Shaer [email protected] Latifur Khan [email protected] Abstract Evaluation of network
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY Firewall Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator: Recommended by Director
