DocumentCode :
3135642
Title :
Composable tools for network discovery and security analysis
Author :
Vigna, Giovanni ; Valeur, Fredrik ; Zhou, Jingyu ; Kemmerer, Richard A.
Author_Institution :
Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
fYear :
2002
fDate :
2002
Firstpage :
14
Lastpage :
24
Abstract :
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network mapping tools. These tools rely on models to represent the entities of interest, and they leverage off network discovery techniques to populate the model structure with the data that is pertinent to a specific target network. Unfortunately, existing tools rely on incomplete data models. Networks are complex systems and most approaches oversimplify their target models in an effort to limit the problem space. In addition, the techniques used to populate the models are limited in scope and are difficult to extend. This paper presents NetMap, a security tool for network modeling, discovery, and analysis. NetMap relies on a comprehensive network model that is not limited to a specific network level; it integrates network information throughout the layers. The model contains information about topology, infrastructure, and deployed services. In addition, the relationships among different entities in different layers of the model are made explicit. The modeled information is managed by using a suite of composable network tools that can determine various aspects of network configurations through scanning techniques and heuristics. Tools in the suite are responsible for a single, well-defined task.
Keywords :
computer networks; network operating systems; security of data; telecommunication security; NetMap; abstract specification; composable network tools; database; heuristics; incomplete data models; model structure; network configurations; network discovery; network mapping tools; network modeling; network security analysis; scanning techniques; topology; Computer network reliability; Computer science; Computer security; Data models; Data security; Information analysis; Information security; Monitoring; Network topology; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2002. Proceedings. 18th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-1828-1
Type :
conf
DOI :
10.1109/CSAC.2002.1176274
Filename :
1176274
Link To Document :
بازگشت