Abstract
Enterprise security must take into account a holistic view of the network. Capturing security and vulnerability attributes of network services and systems is a critical aspect of effective vulnerability analysis and remediation. Unfortunately, this is not always possible due to the overhead associated with tracking distributed resources. Conventional tools create topological maps of a network and extract a signature of the state of individual components. However, these tools require human interpretation to be useful for security. The goal of network modeling for vulnerability analysis is to glean and interpret data from a variety of resources in order to create an abstract model of the security of a network. A sound network model is essential to the analysis of potential threats to a network.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35697-6_26
Chapter PDF
Similar content being viewed by others
References
A. Bieszczad, T. White, and B. Pagurek, Mobile agents for network management, IEEE Communications Surveys,Vol. 1(1), 4th Quarter, 1999.
C. Bryce and J. Vitek, The JavaSeal mobile agent kernel, Proceedings of the First International Symposium on Agent Systems and Applications/Third International Symposium on Mobile Agents, Palm Springs, California, 1999.
J. Dawkins, C. Campbell, R. Larson, K. Fitch, T. Tidwell and J. Hale, Modeling network attacks: Extending the attack tree paradigm, Proceedings of Third Annual International Systems Security Engineering Association Conference, Orlando, Florida, 2002.
A. Hayzelden and J. Bigham, Software agents in communications network management: An overview, Intelligent Systems Application Group, Technical Report, University of London, London, U.K., 1998.
B. Huffaker, E. Nemeth and K. Claffy, Otter: A general-purpose network visualization tool, Proceedings of the Internet Global Summit, San Jose, California, 1999.
B. Huffaker, E. Nemeth, D. Moore and K. Claffy, Topology discovery by active probing, Symposium on Applications and the Internet, Nara, Japan, 2002.
J. Humphries, C. Carver and U. Pooch, Secure mobile agents for network vulnerability scanning, Proceedings of the 2000 IEEE SMC Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, 2000.
J. Lemke, Discover, diagram and report on your network, Technical Report, Microsoft Corporation, Redmond, Washington, 2001.
S. Liang, The Java Native Interface, Addison-Wesley, Reading, Massachusetts, 1999.
N. Minar, K. Kramer and P. Maes, Cooperating mobile agents for mapping networks, Proceedings of the First Hungarian National Conference on Agent Based Computation, 1999.
N. Minar, K. Kramer and P. Maes, Software Agents for Future Communications Systems, Springer-Verlag, Heidelberg, Germany, 1999.
Optimum Network Performance, http://www.opnet.com, Bethesda, Maryland, 2001.
Retina, Eeye Digital Security, http://www.eeye.com/ Aliso Viejo, California, 2002.
B. Schneier, Secrets and Lies, John Wiley, New York, 2000.
R. Siamwalla, R. Sharma and S. Keshav, Discovering Internet topology, Proceedings of the IEEE INFOCOM Conference, New York, 1999.
T. White, B. Pagurek and A. Bieszczad, Network modeling For management applications using intelligent mobile agents, Journal of Network and Systems Management, Vol. 7 (3), 1999.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Campbell, C., Dawkins, J., Pollet, B., Fitch, K., Hale, J., Papa, M. (2003). On Modeling Computer Networks for Vulnerability Analysis. In: Gudes, E., Shenoi, S. (eds) Research Directions in Data and Applications Security. IFIP — The International Federation for Information Processing, vol 128. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35697-6_18
Download citation
DOI: https://doi.org/10.1007/978-0-387-35697-6_18
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6413-0
Online ISBN: 978-0-387-35697-6
eBook Packages: Springer Book Archive