Network vulnerability analysis

被引:0
|
作者
Skaggs, B [1 ]
Blackburn, B [1 ]
Manes, G [1 ]
Shenoi, S [1 ]
机构
[1] Univ Tulsa, Dept Comp Sci, Ctr Informat Secur, Tulsa, OK 74104 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing volume of attacks on the Internet has grown demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. Scanners must be able to function on a variety of networks: Internet (IP), SS7, wireless, and converged networks. Scanners should be extendable and upgradeable to facilitate use by a broad spectrum of users and platforms; such flexibility allows users to keep up with current hacker technology. This paper describes one such scanner, referred to as NetGlean.
引用
收藏
页码:493 / 495
页数:3
相关论文
共 50 条
  • [1] Vulnerability Analysis of the Financial Network
    Khabazian, Aein
    Peng, Jiming
    [J]. MANAGEMENT SCIENCE, 2019, 65 (07) : 3302 - 3321
  • [2] A framework for network vulnerability analysis
    Qu, GZ
    Rudraraju, J
    Modukuri, R
    Hariri, S
    Raghavendra, CS
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2002, : 289 - 294
  • [3] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, Tsong Yueh
    [J]. COMPUTER JOURNAL, 2015, 58 (04): : 878 - 891
  • [4] Vulnerability modelling for the analysis of network attacks
    Maggi, Paolo
    Pozza, Davide
    Sisto, Riccardo
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 15 - 22
  • [5] Vulnerability Analysis of the Optical Network NMS
    Ma, Juntao
    Zhang, Lei
    Zhang, Shaokun
    Yao, Xinlei
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1185 - 1187
  • [6] Computational complexity of network vulnerability analysis
    Berberler, Murat Ersen
    [J]. ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA, 2022, 14 (02) : 199 - 207
  • [7] Vulnerability Analysis on the Cloud Network Topology
    Chen, Ke
    Zhang, Hua
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3007 - 3012
  • [8] A Methodological Overview of Network Vulnerability Analysis
    Murray, Alan T.
    Matisziw, Timothy C.
    Grubesic, Tony H.
    [J]. GROWTH AND CHANGE, 2008, 39 (04) : 573 - 592
  • [9] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, T. Y.
    Kuo, Fei-Ching
    [J]. 2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 189 - +
  • [10] Vulnerability Analysis of Intelligent Network System
    Yan, Danfeng
    Yang, Fangchun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 282 - 285