A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures
|
|
|
- Julius Jenkins
- 10 years ago
- Views:
Transcription
1 A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures Dr.Thaier Hamid University of Bedfordshire, UK Prof. Carsten Maple, University of Bedfordshire, UK ABSTRACT Computer networks are certainly vulnerable as long as they deliver services from different machines. An attack graph is a security model representing the chains of vulnerability exploits in a network displays the ways an attacker can compromise a network or host. A number of researchers have admitted attack graph visual complications and a large amount of source data must be assembled to accurately build an attack graph, the difficulty scaling to large, enterprise-size networks with tens of thousands of hosts and the lack comprehensive understanding. Information on vulnerabilities is present in public vulnerability databases, such as the National Vulnerability Database and Nessus. But current attack graph tools are reserved to only limited attributes. The automatic formation of vulnerability information has been troublesome and vulnerability descriptions were created by hand or based on limited information. Much vulnerability has still not been discovered and many others without patches or solutions Our approach to developing a cost metric exploits the Markov s model using combinations well known vulnerabilities (the Common Vulnerability Scoring System, CVSS) and Risk Assessment Values (RAV) and using ranking algorithms (similar to V. Mehta et al and kijsanayothin, 2010) but instead of using vulnerabilities. For each host we have developed a cost rank Markov s model reducing the complexity in the attack graph, representing the network topology and dipping the problem of visibility. General Terms Graph theoretical, Algorithms, Experimentation Keywords Ranking attack graph, Network security, Security metrics.. 1. INTRODUCTION To define the security effect as applications and operating systems vulnerabilities on a specific network, one must study communications among several network components. For a vulnerability analysis tool to be useful, two features are essential. First, the model used in the analysis must be able to automatically integrate recognized vulnerability conditions from the public vulnerability databases community. Second, the investigation must be capable of measuring networks with thousands of machines relying on software providers that are subject to fault, making them susceptible to malicious attacks. Although the internet, which has brought many benefits to organizations and individuals, it has also increased the risks of having hosts compromised without the need of physical access. Network vulnerabilities refer to exploitable problems in configurations (e.g., ports and services enabled) or the software implemented to provide network services (e.g., Apache Chunked-Code on Apache web servers, buffer overflow on Windows XP SP2, Vista and 7 other operating environments, including TNS Listener on Oracle software for database servers). Figure 1 reflects the number of published vulnerabilities reported by Secunian [6], and the number of Common Vulnerabilities and Exposures (CVEs) disclosed per year since 2005 with a breakdown of the solution status ( Unpatched, patched, total ). As shown in figure 1, on average there were 4,464 CVEs per year from 2005 to An extrapolation of the data of the first half of 2011 leads us to expect that 2011 will exceed the number of CVEs of 2009, but not the average of the last five years. It should be noted that older vulnerabilities are more likely to have a patch available than recently found vulnerabilities. We can see that from 2005 to 2011 we had a sharp increase in the number of vulnerabilities. In and from and , there was an insignificant decrease in and from , of 1.8%. This was due in part to the release of new operating systems at the time. Nevertheless, in 2008 alone, a total of 4,800 vulnerabilities were published. As shown in Figure 1. Consequently, this volume of vulnerabilities requires management from organizations to determine which of the daily reported vulnerabilities apply to their situation according to the software they have installed, their version and configuration. Fig. 1 Number of published vulnerabilities from All in all, solving every vulnerability, for example by patching nonnative services and hosts, is never a solution for multistep attacks. There are basically two types of attack graphs. In the first type, each vertex represents the entire network state and the arcs represent state transitions caused by an attacker s actions. Examples are Sheyner s scenario graph based on model checking [9], and the attack graph in Swiler and Phillips work [15]. This type of attack graph is sometimes called a state enumeration attack graph [9]. In the second type of attack graph, a vertex does not represent the entire state of a system but rather a system condition in some form of logical sentence. The arcs in these graphs represent the interconnection relations between the system conditions. We call this type of attack graph a dependency attack graph. Examples are the 13
2 graph structure used by Ammann et al, state enumeration attack graph in general tend to suffer from the drawback of the state explosion problem [15]. It means the complexity of the graph generated grows exponentially O (2n), in terms of the size of the state space n. The key difference between the two types of attack graphs lies in the semantics of their vertices. While each vertex in a state enumeration attack graph encodes all the conditions in the network, a vertex in a dependency attack graph encodes a single attack asset of the network. A path s1 s2 s3 in a state enumeration attack graph means that the system s state can be transitioned from s1 to s2 and then to s3 by an attacker. But the condition that enables the transition s2 s3 may have already become true in a previous state, say s1. The reason the attacker can get to state s3 is encoded in some state variables in s2, but the arcs in the graph do not directly show where these conditions were first enabled. In a dependency attack graph, however, the dependency relations among various assets are directly represented by the arcs. 1.1Query independent Link based Ranking- PageRank We give the following dentition of PageRank ( ). Let u be a web page (a vertex in the graph). Then let Fu be the set of forward links of u and let Bu be the set of backlinks of u. Let also du = Fu be the out-degree of u. Let also u be the of page u. Then the values of the pages are calculated as follows. Initially, each page is assigned a value of 1/n where n is the number of pages. v = u Bv u du foru V Fig. 3 A simple web graph with vertex weight. Let P be a row stochastic matrix corresponding to the graph G of the web pages, assuming that all edges have at least one outgoing edge. If there is a link from page x to page y, then let the matrix entry P xy have the value 1/di. Let all other entries have the value 0. Table 1: transition probability matrix Then, one iteration of the computation corresponds to the vector matrix multiplication [ ] 1n x [ P ]nn. Repeated multiplication of r by P yields the dominant eigenvector r of the matrix P. Since P corresponds to the stochastic transition matrix of the graph G, PageRank, which is denoted by r, This r can be viewed as the stationary probability distribution over pages induced by a random walk on the web graph [10]. Because P is stochastic, its dominant eigenvalue is one. This leads to the following equation: ( t) ( t1) * P (0) P * Since models the random walk of a web surfer over the web pages, the calculation mentioned above also corresponds to finding a stationary probability distribution for a Markov chain in which web pages represents the states and the matrix P represents the state transition matrix for the states in the chain. Discrete time steps in the chain and corresponds to the iterations of calculation. As we see in figure-4 the ranking after 13 iterations is x=0.16, y=0.22, z=0.33, w=0.27, z in this case it is the most important web site. Fig. 4 A simple web graph with vertex weight after 13 iterations. 1.2 Security Metrics The Common Vulnerability Scoring System, CVSS, calculator [15, 22], maintained The Forum of Incident Response and Security Teams, which was launched in 2004 and is currently on its second version. The CVSS is composed of three metrics groups: base, temporal and environmental, Base: represents the basic and fundamental characteristics of vulnerability that are constant over time and user environments. The Access Vector, Access Complexity, and Authentication Metrics capture how the vulnerability is accessed and whether or not extra conditions are required to exploit it. Risk Assessment Values (RAV) is the computation of security operations [7], controls, and limitations, which represents the current state of protection. The RAV is a derivative from three categories defined within the scope: Operational Security, Loss Controls and Security Limitations. We added the Protocol Complexity Cost to RAV Components as a measure of difficulty that an attacker encounters when trying to bypass channels implementing different protocols (e.g., FTP, SMTP, SSH, VPN) to progress across network nodes. OPsec OPsec sum sum P P P P V A 2 log (1 100 OPsec T P sum Our methodology combines the CVSS score with the Risk Assessment Values. A RAV is the computation of security operations, controls, and limitations, for that we added to the cost metric calculator CV base as follows: CV Base = round_to_1_decimal (((0.6*Impact)+(0.4*Exploitability) 1.5)*f(Impact)). ) (1) 14
3 Fig. 5 RAV cost calculator. 2. METHODOLOGIES FOR DEVELOP- ING COST-CENTRIC APPROACH Instead of specifying a state by network attributes, we propose cost-centric model checking, in which each state is specified by the attributes of a single host. We refer to the corresponding attack graphs, generated with model checking algorithms, as cost-centric attack graphs. In our model, the attributes of any host X include: 1- Attacker s access privilege on host X: Privilege level, i.e., root or system administrator (2), privileged user (1), user, guest, or none(0). 2- Security Metrics cost for each host : represent the CVSS score with the Risk Assessment Values(RAV) for each host. 3- Exploit mode: The locality of an attacker performing an exploit. To illustrate the proposed approach in details, consider a simple network as shown in figure-6 taken from V. Mehta et al. (2006) and used by kijsanayothin (2010) to compare the results, where there are two service hosts: IP1 and IP2, and an attacker s workstation, Attacker, connecting to each of the servers via a central router. Fig. 7 cost attack graph with arc weight. To get the normalized cost matrix we used the following formula: ( u, v) c( u, v) c( u, w) wov Where Ov wout(u) For example s0 s Table 2. Personation cost matrix Fig. 6 a simple network taken from V. Mehta et al v be the probability of intrusion of attack state v at time t let and d be a damping factor representing the probability of an attacker to continue penetrating the current path of the attack. Thus, in the context of network. 1 d v( i1) ( v) d ( u)* ( u, v) N ubv When v is an initial state. v v) d ( u)* ( u, v Otherwise ( ( i 1) ) ubv Where Bv represent the set of pages pointing to v, in(v). 15
4 Table 3. Comparing the Results The Table shows the ranking result obtained when we applied the experiential, that is- s4, s1, s0, s3, s2 (i.e., our approach). Otherwise, s4, s3, s0, s1, s2 is obtained when Mehta et al. s approach is applied and s4, s3, s2, s0, s1 when Kijsanayothin approach is applied Initial results and discussion The ranking is in the order of likelihood of intrusion based on exploitability. For example, all results suggest that s4 has the highest (relative) likelihood of being attacked (i.e., highest exploitability and most vulnerable). To further compare the ranking results, if we omit s0 in all ranking lists, both ranking orders generally agree except a conflicting case of ranking order between s1, s2 and s3. 1- { s1, s2} :Consider attackers from the initial state. As shown in page 21 to reach state s1 (e.g., from s0, s2 or s3) requires exploiting cost , where as to reach state s2 (e.g., from s0 or s3) requires exploiting cost However, according to simple calculations s1 is more vulnerable than s2, in addition that reach to s1 mean the attacker has the ability to compromise a host and reach to the root of IP1 this is not the case for s2. Therefore, s1 should rank higher than s2. 2- {s2, s3}: starting from an initial state s0, to reach s4 through s2 requires three applications of costs of exploitability value , whereas to reach s4 through s3 only requires two applications of cost s of exploitability value Therefore, s3 should rank higher than s2. 3- {s1, s3} :Consider attackers from the initial state. To reach state s1 (e.g., from s0, s2 or s3) requires exploiting cost , where as to reach state s3 (e.g., from s0 or s2 or s1) requires exploiting cost Therefore, s1 should rank higher than s3 because s1 is more vulnerable than s3. 4- {s3, s4}. If there is only one way to reach s4 by an attack path from s0 to s3 to s4 then s3 ranks higher than s4. However, we can reach s4 by another attack path from s0 to s2 to s4 and attack path s0 to s3 to s4 Thus, s4 ranks higher than s3. From the results above the system administrator should give first priority to s4 (IP 2,2) { compromised the root of IP2} as it has the highest (relative) likelihood of being attacked. It has the highest exploitability and is the most most vulnerable. Solutions should be immediately implemented then in the second place s2(ip 1,2) { compromised the root of IP1} then s3(ip 2,1) then s2(ip 1, 1) as we explained. Fig.8 Initial ranking results 3. INVESTIGATES In the following example network, the attacker is initially located in host A and wants to reach either host E that is protectedby a firewall. Fig. 9 An example network, modified from [16] In this example network, the attacker is initially located in host A and wants to reach host E that is protected by a firewall. The firewall only allows traffic from hosts C or D to host E. Router (Ro) connects segment 1 & 2. Additionally, all hosts have a CVE : Microsoft Windows ASN.1 Library Integer vulnerability in the single service they provide. Successful exploitation of this vulnerability results in a buffer overflow condition allowing the attacker to execute arbitrary codes with administrative (system) privileges, potentially causing a complete impact on its confidentiality (C), integrity (I) and availability (A). Table-4 below shows the ranking result obtained when we applied the experimental approach: s12, s11, s10, s7, s9, s6, s8, s5, s3, s2, s1,s4. Table -4. Ranking Results 16
5 Fig. 9 A worst case attack graph. 4. DISCUSSIONS OF THE RESULTS B, 1 D, E, 1 B, 2 D, 2 Att, 2 F, 2 E, 2 S1 S2 S3 S4 S5 S6 S7 S8 S9 S10 S11 S12 Fig.10 Cost ranking result 1. {s12, s11} we can reach s12 by another attack path to s4 thus, s12 ranks higher than s {s11, s10} cost to reach s11: = 557, but the total cost to reach s10 from initial state=482 Therefore, s11 should rank higher than s10 ( same segment). 3. {s9, s7} cost to reach s9= 374 and to s7 =528 from initial state, Therefore, s7 should rank higher than s9. 4. {s9, s8} because s9 (f1) is in the same segment while s7(c1) in other segment2 across, the firewall only allows traffic from hosts C or D to host E. Therefore, s9 should rank higher than s8. 5. {s6, s7, s8} total cost cost to reach s6= 434, and the total cost to reach s7 from initial state=528, the total cost to reach s8 from initial state=407 Therefore s7(cm 2), should rank higher than s6, s8 and s6 rank higher from s8 ( same segment). {s6,s5} total cost to reach s6= 434, while the total cost to reach s5 from initial state=334 Therefore, s6 should rank higher than s5, specially s6= (d, 2) compromised the root. ( same segment). 6. {s5, s4} total cost to reach s4= 209 and to s5 =334 from initial state, Therefore, s5 should rank higher than s4. 7. {s3, s2} from initial state, Therefore, s3 should rank higher than s2. 8. {s1, s2} total cost to reach s2= 257 and to s1 = 222 from initial state, Therefore, s2 should rank higher than s1. A, 2 C, 2 A, 1 F, 1 C, 1 9. {s1, s2} total cost to reach s2= 257 and to s1 = 222 from initial state, Therefore, s2 should rank higher than s1. 4. CONCLUSIONS 1. Advance a new methodology to represent attack graph with cost metrics. 2. Develop new methodology to calculate and represent the cost for each host. 3. Model the problem s parameters into a mathematical framework. 4. Model manual cost calculator to be used in our experiments. 5. Analyze and compare the results of our ranking algorithms with those of Mehta et al. and Kijsanayothin approach respectively. 6. Analyze and compare the results of our ranking algorithms to a medium size network. 5. REFERENCES [1] L. He and N. Bode. Network Penetration Testing. In EC2ND 2005: Proc. of the First European Conference on Computer Network Defense, pages 3-12, London,2006. Springer-Verlag. [2] E. W. Dijkstra. A Discipline of Programming. Prentice Hall, Upper Saddle River, NJ, USA, [3] C. S. Wright. A Taxonomy of Information Systems Audits, Assessments and Reviews. SANS Institute, June [4] B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December [5] W. E. Wesely, F. F. Goldberg, N. H. Roberts, and D. F. Haasl. Fault Tree [6] Secunia Half Year Report 2010, pdf. [7] OSSTMM 3 The Open Source Security Testing Methodology Manual, Creative Commons 3.0 Attribution- NoDerivs , ISECOM, [8] Mehta, V., C. Bartzis, H. Zhu, E. M. Clarke, and J. M. Wing (2006). Ranking attack graphs. In D. Zamboni and C. Kr ugel (Eds.), Recent Advances in Intrusion Detection, Volume 4219 of Lecture Notes in Computer Science, pp Springer. [9] Phongphun Kijsanayothin, Network Security Modeling with Intelligent and Complexity Analysis, [10] ISEGCOM, SCARE The Source Code Analysis Risk Evaluation 15. November 2007, [11] D. Geer and J. Harthorne. Penetration Testing: A Duet. In ACSAC'02: Proc. of the 18th Annual Computer Security Applications Conference, page 185, Washington, DC, USA, IEEE Computer Society. [12] Python. Programming language. [13] Tenable network security: The Nessus Security Scanner. Visited 10-July [14] S. Noel, M. Jacobs, P. Kalapa, and S. Jajodia. Multiple Coordinated Viewsfor Network Attack Graphs. In VIZSEC'05: Proc. of the IEEE Workshops on Visualization for Computer Security, page 12, Washington, DC, USA, IEEE Computer Society. [15] S. Noel and S. Jajodia. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 160{169, Washington, DC, USA, IEEE Computer Society. 17
6 [16] R. Sawilla and X. Ou. Googling Attack Graphs. Technical Report TM , Defense Research and Development Canada, September [17] Brin, S. and L. Page (1998). The anatomy of a largescale hypertextual web search engine. Compute. Netw. ISDN Syst. 30(1-7), [18] Kleinberg, J. M. (1999). Authoritative sources in a hyperlinked environment. J. ACM 46(5), [19] Gy ongyi, Z., H. Garcia-Molina, and J. Pedersen (2004). Combating web spam with trustrank. In VLDB 04: Proceedings of the Thirtieth international conference on Very large data bases, pp VLDB Endowment. [20] ISEGCOM, SCARE The Source Code Analysis Risk Evaluation 15. November 2007, [21] D. Geer and J. Harthorne. Penetration Testing: A Duet. In ACSAC'02: Proc. of the 18th Annual Computer Security Applications Conference, page 185, Washington, DC, USA, IEEE Computer Society. [22] Tenable network security: The Nessus Security Scanner. Visited 10-July
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
ON ATTACK GRAPH MODEL OF NETWORK SECURITY. Hasmik Sahakyan, Daryoush Alipour
26 ON ATTACK GRAPH MODEL OF NETWORK SECURITY Hasmik Sahakyan, Daryoush Alipour Abstract: All types of network systems are subject to computer attacks. The overall security of a network cannot be determined
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson Fellow, IEEE, Danfeng (Daphne) Yao, Member, IEEE
Attack graph analysis using parallel algorithm
Attack graph analysis using parallel algorithm Dr. Jamali Mohammad ([email protected]) Ashraf Vahid, MA student of computer software, Shabestar Azad University ([email protected]) Ashraf Vida, MA
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson, Danfeng (Daphne) Yao, Member, IEEE and Xinming
Practical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
Network Security and Risk Analysis Using Attack Graphs
Network Security and Risk Analysis Using Attack Graphs Anoop Singhal National Institute of Standards and Technology Coauthors: Lingyu Wang and Sushil Jajodia Concordia University George Mason University
NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs Anoop Singhal Ximming Ou NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott
POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing By: Chris Abbott Introduction What is penetration testing? Methodology for assessing network security, by generating and executing
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Measuring the Overall Security of Network Configurations Using Attack Graphs
Measuring the Overall Security of Network Configurations Using Attack Graphs Lingyu Wang 1, Anoop Singhal 2, and Sushil Jajodia 3 1 Concordia Institute for Information Systems Engineering Concordia University
Search engines: ranking algorithms
Search engines: ranking algorithms Gianna M. Del Corso Dipartimento di Informatica, Università di Pisa, Italy ESP, 25 Marzo 2015 1 Statistics 2 Search Engines Ranking Algorithms HITS Web Analytics Estimated
How To Build A Vulnerability Chain
Acta Universitatis Sapientiae Electrical and Mechanical Engineering, 6 (2014) xx-yy Identifying Chains of Software Vulnerabilities: A Passive Non-Intrusive Methodology Béla GENGE 1, Călin ENĂCHESCU 1 1
Big Data Technology Motivating NoSQL Databases: Computing Page Importance Metrics at Crawl Time
Big Data Technology Motivating NoSQL Databases: Computing Page Importance Metrics at Crawl Time Edward Bortnikov & Ronny Lempel Yahoo! Labs, Haifa Class Outline Link-based page importance measures Why
VEA-bility Analysis of Network Diversification
VEA-bility Analysis of Network Diversification Melanie Tupper Supervised by Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University [email protected] [email protected] August 31, 2007 Abstract:
Metrics Suite for Enterprise-Level Attack Graph Analysis
Metrics Suite for Enterprise-Level Attack Graph Analysis Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Sushil Jajodia (PI), Steven Noel (co-pi) Metrics Suite for Enterprise-Level
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Part 1: Link Analysis & Page Rank
Chapter 8: Graph Data Part 1: Link Analysis & Page Rank Based on Leskovec, Rajaraman, Ullman 214: Mining of Massive Datasets 1 Exam on the 5th of February, 216, 14. to 16. If you wish to attend, please
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
A Framework for Analysis A Network Vulnerability
A Framework for Analysis A Tito Waluyo Purboyo 1, Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia Abstract: administrators
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting Roland Rieke Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany [email protected] Abstract.
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
A Novel Quantitative Approach For Measuring Network Security
A Novel Quantitative Approach For Measuring Network Security Mohammad Salim Ahmed [email protected] Ehab Al-Shaer [email protected] Latifur Khan [email protected] Abstract Evaluation of network
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
VULNERABILITY SCANNERS: A PROACTIVE APPROACH TO ASSESS WEB APPLICATION SECURITY
VULNERABILITY SCANNERS: A PROACTIVE APPROACH TO ASSESS WEB APPLICATION SECURITY Sheetal Bairwa 1, Bhawna Mewara 2 and Jyoti Gajrani 3 1,2,3 Department of Information Technology, Government Engineering
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
Attack Graph based Evaluation of Network Security
Attack Graph based Evaluation of Network Security Igor Kotenko and Mikhail Stepashkin SPIIRAS, 39, 14 Liniya, St.-Petersburg, 199178, Russia {ivkote, stepashkin}@comsec.spb.ru Abstract. The perspective
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu
An Analytical Framework for Measuring Network Security using Exploit Dependency Graph
An Analytical Framework for Measuring Network Security using Exploit Dependency Graph Parantapa Bhattacharya Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Email:
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
NV: Nessus Vulnerability Visualization for the Web
NV: Nessus Vulnerability Visualization for the Web Lane Harrison [email protected] Evan Downing [email protected] Riley Spahn [email protected] John R. Goodall [email protected] Mike Iannacone [email protected]
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures
Workshop on Novel Approaches to Risk and Security Management for Utility Providers and Critical Infrastructures Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Xiaobing
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Enterprise Software Management Systems by Using Security Metrics
Enterprise Software Management Systems by Using Security Metrics Bhanudas S. Panchabhai 1, A. N. Patil 2 1 Department of Computer Science, R. C. Patel Arts, Commerce and Science College, Shirpur, Maharashtra,
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Pragmatic Metrics for Building Security Dashboards
SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Information Security Organizations trends are becoming increasingly reliant upon information technology in
DATASHEET PENETRATION TESTING SERVICE Sales Inquiries: [email protected] Visit us: http://www.spentera.com Protect Your Business. Get Your Service Quotations Today! Copyright 2011. PT. Spentera. All Rights
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
How To Analyze And Detect A Network Attack Through A Network Graph
Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven Noel and Sushil Jajodia Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL
Volume 3, No. 3, March 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A NEW METRICS FOR PREDICTING NETWORK SECURITY LEVEL Tito Waluyo Purboyo *1,
A Novel Approach on Zero Day Attack Safety Using Different Scenarios
A Novel Approach on Zero Day Attack Safety Using Different Scenarios 1Shaik Yedulla Peer,2N. Mahesh, 3 R. Lakshmi Tulasi 2 Assist Professor, 3 Head of The Department [email protected] Abstract-A zero day
Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected] ABSTRACT This
EVALUATION OF TOOLS FOR CYBER SECURITY
Project report 2: EVALUATION OF TOOLS FOR CYBER SECURITY By Piyali Basak Indian Institute of Technology, Kanpur Guided by Dr. N.P. Dhavale Deputy General Manager, Strategic Business Unit, Institute for
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Make search become the internal function of Internet
Make search become the internal function of Internet Wang Liang 1, Guo Yi-Ping 2, Fang Ming 3 1, 3 (Department of Control Science and Control Engineer, Huazhong University of Science and Technology, WuHan,
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
