Network vulnerability analysis

被引:0
|
作者
Skaggs, B [1 ]
Blackburn, B [1 ]
Manes, G [1 ]
Shenoi, S [1 ]
机构
[1] Univ Tulsa, Dept Comp Sci, Ctr Informat Secur, Tulsa, OK 74104 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing volume of attacks on the Internet has grown demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. Scanners must be able to function on a variety of networks: Internet (IP), SS7, wireless, and converged networks. Scanners should be extendable and upgradeable to facilitate use by a broad spectrum of users and platforms; such flexibility allows users to keep up with current hacker technology. This paper describes one such scanner, referred to as NetGlean.
引用
收藏
页码:493 / 495
页数:3
相关论文
共 50 条
  • [21] Vulnus: Visual Vulnerability Analysis for Network Security
    Angelini, Marco
    Blasilli, Graziano
    Catarci, Tiziana
    Lenti, Simone
    Santucci, Giuseppe
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2019, 25 (01) : 183 - 192
  • [22] Measuring Road Network Vulnerability with Sensitivity Analysis
    Leng Jun-qiang
    Yang Long-hai
    Liu, Wei-yi
    Lin Zhao
    PLOS ONE, 2017, 12 (01):
  • [23] A Novel Approach for Network Vulnerability Analysis in IIoT
    Sudhakar, K.
    Senthilkumar, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 263 - 277
  • [24] Network and vulnerability analysis of international spice trade
    Lakner, Zoltan
    Szabo, Erzsebet
    Szucs, Viktoria
    Szekacs, Andras
    FOOD CONTROL, 2018, 83 : 141 - 146
  • [25] Vulnerability analysis on subway network: A case study
    Deng, Yongliang
    Li, Qiming
    Lu, Ying
    Song, Liangliang
    International Journal of Applied Mathematics and Statistics, 2013, 49 (19): : 410 - 418
  • [26] The stochastic approach in road network vulnerability analysis
    Bil, Michal
    Vodak, Rostislav
    SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 929 - 932
  • [27] Importance and exposure in road network vulnerability analysis
    Jenelius, Erik
    Petersen, Tom
    Mattsson, Lars-Goran
    TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2006, 40 (07) : 537 - 560
  • [28] Data network structural vulnerability analysis method
    Zhang, X.-Y. (13660077018@139.com), 1600, Beijing University of Posts and Telecommunications (20):
  • [29] Network Vulnerability Analysis Using Text Mining
    Liu, Chungang
    Li, Jianhua
    Chen, Xiuzhen
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT II, 2012, 7197 : 274 - 283
  • [30] Vulnerability Analysis of Electric Power Communication Network
    Wu, Yucong
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 185 - 190