Network vulnerability analysis

被引:0
|
作者
Skaggs, B [1 ]
Blackburn, B [1 ]
Manes, G [1 ]
Shenoi, S [1 ]
机构
[1] Univ Tulsa, Dept Comp Sci, Ctr Informat Secur, Tulsa, OK 74104 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing volume of attacks on the Internet has grown demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. Scanners must be able to function on a variety of networks: Internet (IP), SS7, wireless, and converged networks. Scanners should be extendable and upgradeable to facilitate use by a broad spectrum of users and platforms; such flexibility allows users to keep up with current hacker technology. This paper describes one such scanner, referred to as NetGlean.
引用
收藏
页码:493 / 495
页数:3
相关论文
共 50 条
  • [21] Analysis and vulnerability of the international wheat trade network
    Gutierrez-Moya, E.
    Adenso-Diaz, B.
    Lozano, S.
    [J]. FOOD SECURITY, 2021, 13 (01) : 113 - 128
  • [22] Vulnerability Analysis of Electric Power Communication Network
    Wu, Yucong
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 185 - 190
  • [23] Data network structural vulnerability analysis method
    [J]. Zhang, X.-Y. (13660077018@139.com), 1600, Beijing University of Posts and Telecommunications (20):
  • [24] Network Vulnerability Analysis Using Text Mining
    Liu, Chungang
    Li, Jianhua
    Chen, Xiuzhen
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT II, 2012, 7197 : 274 - 283
  • [25] A Novel Approach for Network Vulnerability Analysis in IIoT
    Sudhakar, K.
    Senthilkumar, S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 263 - 277
  • [26] Network and vulnerability analysis of international spice trade
    Lakner, Zoltan
    Szabo, Erzsebet
    Szucs, Viktoria
    Szekacs, Andras
    [J]. FOOD CONTROL, 2018, 83 : 141 - 146
  • [27] The stochastic approach in road network vulnerability analysis
    Bil, Michal
    Vodak, Rostislav
    [J]. SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 929 - 932
  • [28] Importance and exposure in road network vulnerability analysis
    Jenelius, Erik
    Petersen, Tom
    Mattsson, Lars-Goran
    [J]. TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2006, 40 (07) : 537 - 560
  • [29] Road network topology vulnerability analysis and application
    Tu, Yingfei
    Yang, Chao
    Chen, Xiaohong
    [J]. PROCEEDINGS OF THE INSTITUTION OF CIVIL ENGINEERS-TRANSPORT, 2013, 166 (02) : 95 - 104
  • [30] Method based on GSCPN for network vulnerability analysis
    Gao, Xiang
    Zhu, Yue-Fei
    Fei, Jin-Long
    Han, Tao
    [J]. Journal of Software, 2013, 8 (08) : 2032 - 2038