A Novel Quantitative Approach For Measuring Network Security
|
|
|
- Abigail West
- 10 years ago
- Views:
Transcription
1 A Novel Quantitative Approach For Measuring Network Security Mohammad Salim Ahmed Ehab Al-Shaer Latifur Khan Abstract Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design security countermeasures, to choose between alternative security architectures, and to systematically modify security configurations in order to improve security. However, the security of a network depends on a number of dynamically changing factors such as emergence of new vulnerabilities and threats, policy structure and network traffic. Identifying, quantifying and validating these factors using security metrics is a major challenge in this area. In this paper, we propose a novel security metric framework that identifies and quantifies objectively the most significant security risk factors, which include existing vulnerabilities, historical trend of vulnerability of the remotely accessible services, prediction of potential vulnerabilities for any general network service and their estimated severity and finally policy resistance to attack propagation within the network. We then describe our rigorous validation experiments using reallife vulnerability data of the past 6 years from National Vulnerability Database (NVD) [10] to show the high accuracy and confidence of the proposed metrics. Some previous works have considered vulnerabilities using code analysis. However, as far as we know, this is the first work to study and analyze these metrics for network security evaluation using publicly available vulnerability information and security policy configuration. 1 I. INTRODUCTION Each network can be regarded as a collection of systems that provide various services to its clients or users. When considering security, the measurement approach must be able to evaluate each of these systems individually. Apart from service vulnerabilities, global security policy configuration of the network defines how deeply security breaches will affect the network. In this paper, we present a new framework for network security policy evaluation that can quantitatively measure the security of a network based on two critical risk aspects - the risk of having a successful attack and the risk of this attack being propagated within the network. All these risk factors and their scope can be seen in Figure 1. We have, therefore, modeled our framework as a combination of two parts. The first part measures the security level of the services based on vulnerability analysis. The analysis considers the presence of existing vulnerabilities, the dormant risk based on Department of Computer Science, The University of Texas at Dallas. School of Computer Science, Telecommunications and Information Systems, DePaul University. 1 This research was supported in part by National Science Foundation under Grant No. CT Any opinions, findings, conclusions or recommendations stated in this material are those of the authors and do not necessarily reflect the views of the funding sources. Fig. 1. Network risk measurement framework previous history of vulnerabilities and future predictions. Our second part measures the security of the network from policy perspective. The degree of penetration or impact of successful attacks is considered in this measure. From the service risk components, we get the threat likelihood and at the same time the attack propagation provides us with the risk impact to the network of interest. When the risk impact is combined with the cost of the damage, we get the contribution of network policies in the total risk. The threat likelihood and the risk impact obtained from the two parts are significant indications of total network risk. The proposed evaluation metrics can help in comparing security policies with each other to determine which policy is more secure. It is also possible to judge the effect of a change to the policy by comparing the security metrics before and after the change. This framework will also allow networks to be evaluated and hardened automatically by constantly monitoring dynamic changes in the network and service vulnerabilities. Using the National Vulnerability Database published by NIST, we performed extensive evaluation of our proposed model. The results show high level of accuracy in the evaluation. Our framework is novel as the existing tools and previous research works only scan or analyze a given network to find out allowed traffic patterns and existence of vulnerabilities, and do not predict the future security state of the network. Works that do try to predict future vulnerabilities are only beginning to emerge [4]. But this work requires inside knowledge of the studied software. Our prediction model is general and can work using only publicly available data /08/$ IEEE 76
2 The organization of the paper is as follows. First, we discuss related works in Sect. II. Then, we discuss the service risk analysis part and the network policy risk of our security metric in Sect. III and Sect. IV respectively. We then present our experiments and results in Sect. V and conclusions in Sect. VI. II. RELATED WORK Keeping the network secure is of utmost importance to any organization. Many organizational standards have evolved to evaluate the security of an organization [12]. Proffessional organizations as well as tools like Nessus, Retina and others that perform vulnerability analysis also exist. There has also been some research in the security policy evaluation and verification. A. Atzeni et al. discuss the importance of security metrics in [6]. Evaluation of VPN, Firewall and Firewall security policies include [2], [3], [7], [8]. Attack graph [5] is another technique that is used to assess the risks associated with network exploits. There has been some research focusing on the attack surface of a network. Mandhata et al. in [9] have tried to find the attack surface from the attackability of a system. In [11] Pamula propose a security metric based on the weakest adversary (i.e. the least amount of effort required to make an attack successful). In [4], Alhazmi et al. present their results on the prediction of vulnerabilities. Sahinoglu et al. propose a framework in [13] for calculating risk. They consider present vulnerabilities in terms of threat represented as probability of exploiting a vulnerability and also the lack of counter-measures. But all these work do not represent the total picture as they predominantly try to find existing risk and do not address how risky the system will be in the near future or how policy structure or network traffic would impact on security. In our previous work, published as a short paper [1], we performed a preliminary investigation of measuring the existing vulnerability and explored some historical trends. This work was still limited in analysis and scope as many other evaluation measures that we have discussed in this paper were left unexplored. III. NETWORK SERVICE RISK ANALYSIS In this section, we describe and discuss in detail the calculation method of our vulnerability analysis for service risk measurement. This analysis comprises of Existing Vulnerability Measure, Historical Vulnerability Measure and Probabilistic Vulnerability Measure. Existing vulnerability is important for networks in which the services are left unpatched or where there are no known patches available. Also, when a vulnerability is discovered, it takes time before a patch is introduced for it. During that time the network and services are vulnerable to outside attack. The Existing Vulnerability Measure (EVM) measures this risk toward the services within the network. The EV M is a measure of the severity of the vulnerabilities present in the network. It has been studied and formalized in our previous work [1]. There are a multitude of commercial and open source network vulnerability scanning softwares for finding vulnerabilities present in the network for such measurement purposes. Therefore, we can use EV M as part of the proposed framework based on our previous work or other similar works. However, finding the risk to fully patched services based on historical trend and future prediction is one of the major challenges where we contribute in this paper. A. Historical Vulnerability Measure The Historical Vulnerability Measure (HVM) measures how vulnerability prone a given service has been in the past, based on the vulnerability history report of the service. Considering both the frequency and recency of the vulnerabilities, we combine the severity scores of past vulnerabilities so that a service with a high frequency of vulnerabilities in the near past has a high HV M. We first need to determine the HV M of individual services. We divide the vulnerabilities of service S, into three groups HV H (S), HV M (S) and HV L (S) for vulnerabilities that pose high, medium and low risks. We assign progressively high to low weight to them. During evaluation, the vulnerabilities discovered a long time ago should carry smaller weight, because with time these would be analyzed and patched. Our analysis of vulnerabilities found the service vulnerability to be more dependent on recent vulnerabilities. And this dependency is not linear. Hence, we apply an exponential decay function of vulnerability age. DV (v i)=ss(v i).e βage(v i) Here the parameter β controls how fast the factor decays with age. In computing the HV M of individual services, we sum up these decayed scores in each class, and take their weighted sum. Finally, we take its natural logarithm to bring it to a more manageable magnitude. Mathematically, HV M(S) =ln 1+ w X. DV (v i) (2) X {H,M,L} v i HV X (S) In order to evaluate the aggregated HV M of a system, we take all the services exposed to the network, and combine their HV Ms. If the set of such services in a system A is SERV ICES(A), then the aggregated measure, AHV M(A) is calculated as AHV M(A) =ln e HV M(s i) (3) s i SERV ICES(A) This equation is designed to be dominated by the highest HV M of the services exposed by the policy. We take the exponential average of all the HV Ms so that the score will be at least equal to the highest HV M, and will increase with the HV M s of the other services. If arithmetic average was taken, then the risk of the most vulnerable services would have been undermined. Our formalization using the exponential average is validated through our conducted experiments. B. Probabilistic Vulnerability Measure The Probabilistic Vulnerability Measure (PVM) combines the probability of a vulnerability being discovered in the next period of time and the expected severity of that vulnerability to give an indication of the risk faced by the network in the near future. Using the vulnerability history of a service, we can calculate the probability of at least one new vulnerability being published in a given period of time as well as the probability distribution of the severities of the vulnerabilities affecting the service. From this (1) 77
3 probability distribution, we can compute the expected severity of the vulnerabilities exposed in the next period of time. We define a new measure, Expected Risk (ER) for a service as the product of the probability of at least one new vulnerability affecting the service in the next period of time and the expected severity of the vulnerabilities. Given a score of X for the ER of a service, we can then say that the service has a 100% probability of getting at least one new vulnerability of severity X in the next period of time. First, we construct the list of the interarrival times between the previous vulnerabilities affecting each service. Then we compute the probability of the interarrival time being less than or equal to a given period of time, T. We find P si, the probability that d si, the number of days before the next vulnerability of the service s i is exposed, is less than or equal to a given time interval, T. The value of T that results in the best accuracy is determined experimentally from the vulnerability database used. To compute the expected severity, we build the probability distribution of the severities. Using X as the random variable corresponding to the severities, we can define the expected risk, ER, ofaservices i as in Eqn. 4. ER(s i )=P si E[X si ] (4) Where E[X si ] is the expected value of X for service s i.we compute PVM for all services S in the network as in Eqn. 5 PVM (S) =ln s i S e ER(si) (5) Exponential Distribution is the first method that we have analyzed to calculate PVM. We can fit the interarrival times to an exponential distribution, and then we can find the required probability from the Cumulative Distribution Function (CDF). If λ is the mean interarrival time of service S i, then the interarrival times of service S i, d Si, will be distributed exponentially with the following CDF: P si = P (d Si T )=F dsi (T )=1 e λt (6) The next method, that we have analyzed is Empirical Distribution. Here, the frequency distribution is used to construct a Cumulative Distribution Function (CDF). Let f i (x) be the number of times the value x occurs in the interarrival time data of the service S i. Then, the empirical CDF of the interarrival time, d Si, will be: x T P si = P (d Si T )=F dsi (T )= f i (x) (7) fi (x) IV. NETWORK POLICY RISK ANALYSIS The network policies determine the extent to which a network will be exposed to outside world. The degree to which a policy allows an attack to spread within the network is given by the Attack propagation (AP) metric. This measure assesses how difficult it is for an attacker to propagate an attack through the network, using service vulnerabilities as well as security policy vulnerabilities. This measure complements the other three measures introduced earlier, to form a comprehensive metric that can help analyze specific areas to improve the security of a given network where different security policies may interact. For the purpose of this measure, we define a general network having N hosts and protected by k firewalls in terms of the following sets: D = {d N : d is a host running a service that is directly reachable f rom outside the network} S n = {s S : host n runs service s} P = {p s : p s is the combined vulnerability measure for service s S} Here, p s will be a decreasing function of both EV M and HV M of service s and has the range (0, 1). 1) The Attack Immunity of a Service: For our analysis, we define a measure, I s, that assesses the attack immunity of a given service, s, to vulnerabilities based on that service s EV M and HV M. I s is directly calculated from the combined vulnerability measure of a service s, p s as: I s = ln(p s ) (8) I s has a range of [0, ), and is used to measure the ease with which an attacker can propagate an attack from one host to the other using service s. Thus, if host a can connect to host b using service s exclusively, then I s measures the immunity of host b to an attack initiating from host a. Assuming that the combined vulnerability measure is independent for different services, we can calculate a combined vulnerability measure p smn and define the combined attack immunity I smn as: I smn = ln(p smn ) PL (9) Here PLis the protection level. For protection using firewall, this level is 1, and for protection using IDS, this is a value between 0 and 1 that is equal to the false negative rate of the IDS. After measuring the immunities, we map the network of interest to a Service Connectivity Graph (SCG). The SCG is a directed graph that represents each host in the network by a vertex, and a directed edge from m to n for each pair m, n N indicates connectivity from m to n through a service. 2) Calculating the Attack Propagation: To assess the security of a network, for each node d in D, we want to find how difficult it is for an attacker to compromise all the hosts within reach from d. To do that, we build a minimum spanning tree for d for its segment of the SCG. We define Service Breach Effect (SBE d ) to be the weight of the tree rooted at d in D. It actually denotes the damage possible through d. SBE d is calculated as in Eqn. 10 SBE d = n N( m nodes from d to m p sdm ) Cost n (10) Here Cost n indicates the cost of damage when host n is compromised and N is the set of hosts present in the spanning tree rooted at host d. Finally, the attack propagation metric of the network is: AP (D) = d D P (d) SBE d (11) Where, P (d) denotes the probability of the existence of a vulnerability in host d. The equation is formulated such that it provides us with the expected cost as a result of attack propagation within the network. 78
4 (a) (b) (c) Fig. 2. (a) Accuracy of the HVM for different values of β and minimum number of vulnerabilities. (b) Results of ER validation with training data set size vs. accuracy for different test data set sizes. (c) Results of ER validation with test data set size Vs. accuracy for different training data set sizes. V. EXPERIMENTS AND RESULTS In our experiments, we used the National Vulnerability Database (NVD) published by National Institute of Science and Technology (NIST) [10]. The NVD provides a rich array of information that makes it the vulnerability database of choice. All the vulnerabilities are stored using the standard CVE (Common Vulnerabilities and Exposures) name. For each vulnerability, the NVD provides the products and versions affected, descriptions, impacts, cross-references, solutions, loss types, vulnerability types, the severity class and score, etc. We have used the database snapshot updated at 04/05/2007. For each vulnerability in the database, NVD provides CV SS [14] scores in the range 1 to 10. A. Validation of HVM We conducted an experiment to evaluate the HV M score according to Eqn. 2 with the hypothesis that if service A has a higher HV M than service B, then in the next period of time, service A will display a higher number of vulnerabilities than B. In our experiment, we used vulnerability data up to 06/30/2006 to compute the HV M of the services, and used the rest of the data to validate the result. We varied β so that the decay function falls to 0.1 in 0.5, 1, 1.5 and 2 years respectively, and observed the best accuracy in the first case. Here, we first chose services with at least 10 vulnerabilities in their lifetimes, and gradually increased this lower limit to 100 and observed that the accuracy increases with the lower limit. As expected of a historical measure, better results have been found when more history is available for the services and observed the maximum accuracy of 83.33%. The graph in Fig. 2(a) presents the results of this experiment. B. Validation of Expected Risk (ER) The experiment for the validation of Expected Risk, ER, is divided into a number of parts. First, we conducted experiments to evaluate the different ways of calculating the probability. Our general approach was to partition the data into training and test data sets, compute the quantities of interest from the training data sets and validate the computed quantity using the test data sets. If these computed values were close enough, we regarded the measurement as accurate. Here, we obtained the most accurate and stable results using exponential CDF. The data used in the experiment for exponential CDF was the inter-arrival times for the vulnerability exposures for the services in the database. We varied the length of the training data set and test data set for both the probability and Expected Severity. In this case, we considered only the data with T =90. In the experiment for exponential CDF, we constructed an exponential distribution for the interarrival time data using Eqn. 6. For each training set, we varied the value of T from 15 days to 90 days in 15 day increments, and ran validation for each value of T with the test data set. Finally we took the average of the accuracies for each combination of training data set size and test data set size. a) Results: The results of the ER experiment are presented in Figs. 2(b) and 2(c). In Fig. 2(b), we present the accuracy along the Y axis as a percentage against the training data set sizes. In Fig. 2(c) we present the same accuracies but with respect to test set sizes. Fig. 3(a) presents the accuracy of the computed probabilities using Exponential CDF method. For the test data set size of 12 months, we observed the highest accuracy of 78.62% with the 95% confidence interval being [72.37, 84.87] for the training data set size of 42 months and prediction interval of 90 days. We present the results of the experiment for Expected Severity in Fig. 3(c). The maximum accuracy obtained in this experiment was 98.94% for the training data set size of 3 months and test data set size of 9 months. b) Discussion Of Results: From the graph in Fig. 3(a) and Fig. 3(b), it is apparent that the accuracy of the Exponential CDF model is not much sensitive to training data set sizes but increases with T. This implies that this method is not sensitive to the volume of training data available to it. From Fig. 3(c), it is readily observable that the accuracy of the Expected Severity is not dependent on the test data set size. It increases quite sharply with decreasing values of training data set size for small values. This means that the expectated values calculated from the most recent data is actually the best model for the expected severity in the test data. And from Fig. 2(b) and Fig. 2(c), we can observe that the accuracy of the Expected Risk (ER) is slightly correlated with the training data set size but strongly correlated with the test data set size. C. Running Time Evaluation Of Attack Propagation Metric To assess the feasibility of calculating the AP under different conditions, we ran a MATLAB implementation of the algorithm for different network sizes, as well as different levels of network connectivity percentages (the average percentage of the network 79
5 (a) (b) (c) Fig. 3. (a) Training Data Set Size Vs. Accuracy graph for the Exponential CDF method for probability calculation, test set size = 12 months. (b) Prediction Interval Parameter (T ) Vs. Accuracy graph for the Exponential CDF method for probability calculation, test set size = 12 months. (c) Training data set size Vs. Accuracy graph for the Expected Severity calculation for different values of the test data set size. Running time per server (Sec) Fig Network size %Connectivity The average running times for different network sizes and %connectivity directly reachable from a host). The machine used to run the simulation was a 1.9GHz P-IV processor with 768MB RAM. The results are shown in figure 4. For each network size, we generated several random networks with the same %connectivity value. The running time was then calculated for several hosts within each network. As can be seen from the figure, the quadratic growth of the running time against network connectivity was not noticeably dependent on the network %connectivity in our implementation. VI. CONCLUSIONS A unified policy evaluation metric will be highly effective in assessing the protection of the current policy, and justifying consequent decisions to strengthen security of a network. In this paper, we present a novel approach to quantitatively evaluate network security by identifying, formulating and validating several important factors that greatly affect the security of a network. Our experiments validate our hypothesis that if a service has a highly vulnerability prone history, then there is higher probability that the service will become vulnerable again in the near future. These metrics are useful not only for administrators to evaluate policy/network changes and, take timely and judicious decisions, but also for enabling adaptive security systems based on vulnerability and network changes. Our experiments provide very promising results regarding our metric. Our vulnerability prediction model proved to be up to 78% accurate, while the accuracy level of our historical vulnerability measurement was 83.33% based on real-life data from National Vulnerability Database (NVD). The accuracies obtained in these experiments, vindicate our claims about the components of our risk measurement framework and proves its effectiveness. ACKNOWLEDGMENTS The authors would like to thank Mohamed Mahmoud Taibah of Depaul University and Muhammad Abedin and Syeda Nessa of The University of Texas at Dallas for their help with the formalization and experiment which made this work possible. REFERENCES [1] M. Abedin, S. Nessa, E. Al-Shaer, and L. Khan. Vulnerability analysis for evaluating quality of protection of security policies. In 2nd ACM CCS Workshop on Quality of Protection, Alexandria, Virginia, October [2] E. Al-Shaer and H. Hamed. Discovery of policy anomalies in distributed firewalls. In Proceedings of IEEE INFOCOM 04, March [3] E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC), 23(10), October [4] O. H. Alhazmi and Y. K. Malaiya. Prediction capabilities of vulnerability discovery models. In Proc. Reliability and Maintainability Symposium, pages 86 91, January [5] P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In 9th ACM conference on Computer and communications security, pages , [6] A. Atzeni and A. Lioy. Why to adopt a security metric? a little survey. In QoP-2005: Quality of Protection workshop, September [7] H. Hamed, E. Al-Shaer, and W. Marrero. Modeling and verification of ipsec and vpn security policies. In IEEE ICNP 2005, November [8] S. Kamara, S. Fahmy, E. Schultz, F. Kerschbaum, and M. Frantzen. Analysis of vulnerabilities in internet firewalls. Computers and Security, 22(3):214232, April [9] P. Manadhata and J. Wing. An attack surface metric. In First Workshop on Security Metrics, Vancouver, BC, August [10] National institute of science and technology (nist). [11] J. Pamula, P. Ammann, S. Jajodia, and V. Swarup. A weakest-adversary security metric for network configuration security analysis. In ACM 2nd Workshop on Quality of Protection 2006, Alexandria, VA, October [12] R. Rogers, E. Fuller, G. Miles, M. Hoagberg, T. Schack, T. Dykstra, and B. Cunningham. Network Security Evaluation Using the NSA IEM. Syngress Publishing, Inc., first edition, August [13] M. Sahinoglu. Security meter: A practical decision-tree model to quantify risk. In IEEE Security and Privacy, June [14] M. Schiffman. A complete guide to the common vulnerability scoring system (cvss). June
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
VEA-bility Analysis of Network Diversification
VEA-bility Analysis of Network Diversification Melanie Tupper Supervised by Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University [email protected] [email protected] August 31, 2007 Abstract:
Security Risk Assessment of Software Architecture
Security Risk Assessment of Software Architecture Fadi HajSaid 1, Yousef Hassouneh 2, Hany Ammar 1, 1 West Virginia University, USA; 2 Birzeit University, Palestine [email protected], [email protected],
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
Network Security and Risk Analysis Using Attack Graphs
Network Security and Risk Analysis Using Attack Graphs Anoop Singhal National Institute of Standards and Technology Coauthors: Lingyu Wang and Sushil Jajodia Concordia University George Mason University
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
How To Analyze And Detect A Network Attack Through A Network Graph
Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven Noel and Sushil Jajodia Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson, Danfeng (Daphne) Yao, Member, IEEE and Xinming
A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL
Volume 3, No. 3, March 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL Tito Waluyo Purboyo *1,
An Analytical Framework for Measuring Network Security using Exploit Dependency Graph
An Analytical Framework for Measuring Network Security using Exploit Dependency Graph Parantapa Bhattacharya Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Email:
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson Fellow, IEEE, Danfeng (Daphne) Yao, Member, IEEE
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu
Attack graph analysis using parallel algorithm
Attack graph analysis using parallel algorithm Dr. Jamali Mohammad ([email protected]) Ashraf Vahid, MA student of computer software, Shabestar Azad University ([email protected]) Ashraf Vida, MA
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
Metrics Suite for Enterprise-Level Attack Graph Analysis
Metrics Suite for Enterprise-Level Attack Graph Analysis Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Sushil Jajodia (PI), Steven Noel (co-pi) Metrics Suite for Enterprise-Level
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Complete Redundancy Detection in Firewalls
Complete Redundancy Detection in Firewalls Alex X. Liu and Mohamed G. Gouda Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, USA {alex, gouda}@cs.utexas.edu
A Framework for Analysis A Network Vulnerability
A Framework for Analysis A Tito Waluyo Purboyo 1, Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia Abstract: administrators
A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures
A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures Dr.Thaier Hamid University of Bedfordshire, UK Prof. Carsten Maple, University of Bedfordshire, UK ABSTRACT Computer networks
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Identification of File Integrity Requirement through Severity Analysis
Identification of File Integrity Requirement through Severity Analysis Zul Hilmi Abdullah a, Shaharudin Ismail a, Nur Izura Udzir b a Fakulti Sains dan Teknologi, Universiti Sains Islam Malaysia, Bandar
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
A Novel Approach on Zero Day Attack Safety Using Different Scenarios
A Novel Approach on Zero Day Attack Safety Using Different Scenarios 1Shaik Yedulla Peer,2N. Mahesh, 3 R. Lakshmi Tulasi 2 Assist Professor, 3 Head of The Department [email protected] Abstract-A zero day
Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process
Techniques for Supporting Prediction of Security Breaches in Critical Cloud Infrastructures Using Bayesian Network and Markov Decision Process by Vinjith Nagaraja A Thesis Presentation in Partial Fulfillment
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council
Version 1.0 Date: Author: PCI Security Standards Council Executive Summary The time to migrate is now. For over 20 years Secure Sockets Layer (SSL) has been in the market as one of the most widely-used
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting Roland Rieke Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany [email protected] Abstract.
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Parametric Attack Graph Construction and Analysis
Parametric Attack Graph Construction and Analysis Leanid Krautsevich Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica,
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Measuring the Overall Security of Network Configurations Using Attack Graphs
Measuring the Overall Security of Network Configurations Using Attack Graphs Lingyu Wang 1, Anoop Singhal 2, and Sushil Jajodia 3 1 Concordia Institute for Information Systems Engineering Concordia University
How To Build A Vulnerability Chain
Acta Universitatis Sapientiae Electrical and Mechanical Engineering, 6 (2014) xx-yy Identifying Chains of Software Vulnerabilities: A Passive Non-Intrusive Methodology Béla GENGE 1, Călin ENĂCHESCU 1 1
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
2012 31st International Symposium on Reliable Distributed Systems Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics Pengsu Cheng, Lingyu Wang, Sushil Jajodia and Anoop Singhal Concordia
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures
Workshop on Novel Approaches to Risk and Security Management for Utility Providers and Critical Infrastructures Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Xiaobing
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY
CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Review: McAfee Vulnerability Manager
Review: McAfee Vulnerability Manager S3KUR3, Inc. Communicating Complex Concepts in Simple Terms Tony Bradley, CISSP, Microsoft MVP September 2010 Threats and vulnerabilities are a way of life for IT admins.
Toward Measuring Network Security Using Attack Graphs
Toward Measuring Network Security Using Attack Graphs Lingyu Wang Concordia Institute for Information Systems Engineering Concordia University Montreal, QC H3G 1M8, Canada [email protected] Anoop
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Topological Vulnerability Analysis
Topological Vulnerability Analysis Sushil Jajodia and Steven Noel Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
A Multi-Objective Optimisation Approach to IDS Sensor Placement
A Multi-Objective Optimisation Approach to IDS Sensor Placement Hao Chen 1, John A. Clark 1, Juan E. Tapiador 1, Siraj A. Shaikh 2, Howard Chivers 2, and Philip Nobles 2 1 Department of Computer Science
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
GVScan: Scanning Networks for Global Vulnerabilities
1 GVScan: Scanning Networks for Global Vulnerabilities Fabrizio Baiardi, Fabio Corò and Federico Tonelli Department of Computer Science, University of Pisa, Pisa, Italy Email: [baiardi,fcoro,tonelli]@di.unipi.it
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University,
Firewall Queries Alex X. Liu 1, Mohamed G. Gouda 1, Huibo H. Ma 2, Anne HH. Ngu 2 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs Anoop Singhal Ximming Ou NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks
Vulnerability Scanning & Management
Vulnerability Scanning & Management (An approach to managing the risk level of a vulnerability) Ziad Khalil 1, Mohamed Elammari 2 1 Higher Academy, 2 Rogue Wave Software Ottawa, Canada Abstract Vulnerability
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
