DocumentCode :
1584011
Title :
Methodology for network communication vulnerability analysis
Author :
Ristenbatt, Marlin P.
Author_Institution :
Michigan Univ., Ann Arbor, MI, USA
fYear :
1988
Firstpage :
493
Abstract :
A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included
Keywords :
military systems; protocols; telecommunication networks; accessibility; communication protocols; control; data link vulnerability analysis susceptibility; feasibility; interceptability; management; network characteristics; network control data; network taxonomy; network vulnerability assessment methodology; open systems interconnection reference model; security; spoofing; topology; Access protocols; Communication networks; Communication system control; Data security; Jamming; Network topology; Physical layer; Taxonomy; Telecommunication traffic; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 1988. MILCOM 88, Conference record. 21st Century Military Communications - What's Possible? 1988 IEEE
Conference_Location :
San Diego, CA
Type :
conf
DOI :
10.1109/MILCOM.1988.13437
Filename :
13437
Link To Document :
بازگشت