Title :
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination
Author :
Al-Salloum, Ziyad S. ; Wolthusen, Stephen D.
Author_Institution :
Inf. Security Group, Univ. of London, Egham, UK
Abstract :
Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether these are known to an organizationpsilas asset database or not. This is particularly critical if a security incident is in progress and the exposure to a vulnerability must be assessed and potentially mitigated as quickly and completely as possible. In this paper we therefore propose a probabilistic discovery and mitigation algorithm traversing a network with only knowledge of the immediate network neighborhood as can be obtained from passive observation of the LLDP protocol to minimize bandwidth consumption in conjunction with persistent agents deployed by the traversal to capture transient or intermittently active nodes and provide an analysis of the algorithmpsilas efficiency under different topologies and taking into account link failure as well as inconclusive or failed discovery and mitigation operation probabilities.
Keywords :
internetworking; security of data; telecommunication security; virtual machines; LLDP protocol; account link failure; internetworking; mitigation algorithm; mitigation dissemination; mitigation operation probability; nontrivial network; organization asset database; probabilistic discovery; security incident; semi-autonomous link layer vulnerability discovery; transient connectivity; virtual machines; vulnerability management; Asset management; Bandwidth; Data security; Databases; Environmental management; Internetworking; Protection; Protocols; Risk management; Virtual machining;
Conference_Titel :
IT Security Incident Management and IT Forensics, 2009. IMF '09. Fifth International Conference on
Conference_Location :
Stuttgart
Print_ISBN :
978-0-7695-3807-5
DOI :
10.1109/IMF.2009.14