DocumentCode
2355879
Title
Agent-based host enumeration and vulnerability scanning using dynamic topology information
Author
Al-Salloum, Ziyad S. ; Wolthusen, Stephen D.
Author_Institution
Inf. Security Group, Univ. of London, Egham, UK
fYear
2010
fDate
2-4 Aug. 2010
Firstpage
1
Lastpage
8
Abstract
Edge networks in enterprise networks are increasingly complex and dynamic, raising questions about the ability to maintain a current overview of computing assets on the network and their potential vulnerability. However, to respond to ongoing or impending attacks that may propagate at high speed, it has become crucial to ensure proper and efficient reachability of all network nodes that might be at risk so as to be able to assess and, where possible, mitigate the threat. In this paper we therefore propose an agent-based semi-autonomous scanning mechanism which utilizes topology information to traverse networks with minimum bandwidth usage and maximum network coverage, and hence avoiding potential service degradation in large-scale structured networks. Topology information is also used to constrain propagation to a well defined network, while intermittently active hosts and topology changes are detected by using resident reactive agents plotted throughout the mechanism gradual propagation.
Keywords
business communication; computer network security; network topology; software agents; agent-based host enumeration; bandwidth usage; computing assets; dynamic topology information; edge networks; enterprise networks; large-scale structured networks; network coverage; network nodes; service degradation; vulnerability scanning; Computer aided manufacturing; Grippers; IP networks; Local area networks; Network topology; Switches; Topology;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security for South Africa (ISSA), 2010
Conference_Location
Sandton, Johannesburg
Print_ISBN
978-1-4244-5493-8
Type
conf
DOI
10.1109/ISSA.2010.5588317
Filename
5588317
Link To Document