Network vulnerability analysis

被引:0
|
作者
Skaggs, B [1 ]
Blackburn, B [1 ]
Manes, G [1 ]
Shenoi, S [1 ]
机构
[1] Univ Tulsa, Dept Comp Sci, Ctr Informat Secur, Tulsa, OK 74104 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing volume of attacks on the Internet has grown demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. Scanners must be able to function on a variety of networks: Internet (IP), SS7, wireless, and converged networks. Scanners should be extendable and upgradeable to facilitate use by a broad spectrum of users and platforms; such flexibility allows users to keep up with current hacker technology. This paper describes one such scanner, referred to as NetGlean.
引用
收藏
页码:493 / 495
页数:3
相关论文
共 50 条
  • [31] Analysis and vulnerability of the international wheat trade network
    Gutierrez-Moya, E.
    Adenso-Diaz, B.
    Lozano, S.
    FOOD SECURITY, 2021, 13 (01) : 113 - 128
  • [32] Road network topology vulnerability analysis and application
    Tu, Yingfei
    Yang, Chao
    Chen, Xiaohong
    PROCEEDINGS OF THE INSTITUTION OF CIVIL ENGINEERS-TRANSPORT, 2013, 166 (02) : 95 - 104
  • [33] Method based on GSCPN for network vulnerability analysis
    Gao, Xiang
    Zhu, Yue-Fei
    Fei, Jin-Long
    Han, Tao
    Journal of Software, 2013, 8 (08) : 2032 - 2038
  • [34] Multiple perspective vulnerability analysis of the power network
    Wang, Shuliang
    Zhang, Jianhua
    Duan, Na
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 492 : 1581 - 1590
  • [35] Analysis and vulnerability of the international wheat trade network
    E. Gutiérrez-Moya
    B. Adenso-Díaz
    S. Lozano
    Food Security, 2021, 13 : 113 - 128
  • [36] Network vulnerability analysis through vulnerability take-grant model (VTG)
    Shahriari, HR
    Sadoddin, R
    Jalili, R
    Zakeri, R
    Omidian, AR
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 256 - 268
  • [37] Vulnerability analysis of a natural gas pipeline network based on network flow
    Wang, WuChang
    Zhang, Yi
    Li, YuXing
    Liu, Chengsong
    Han, Shiying
    INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING, 2020, 188
  • [38] Vulnerability analysis of inland waterways network base on complex network theory
    Changhai H.
    Shenping H.
    Fancun K.
    Shaoyong X.
    International Journal of Computers and Applications, 2020, 42 (01) : 67 - 75
  • [39] Modeling and vulnerability analysis of military communication network based on complex network
    Guo, Haoming
    Wang, Shuangling
    Yan, Xuefeng
    Zhang, Kecheng
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2024, 42 (06): : 1126 - 1134
  • [40] Union of Random Minkowski Sums and Network Vulnerability Analysis
    Agarwal, Pankaj K.
    Har-Peled, Sariel
    Kaplan, Haim
    Sharir, Micha
    DISCRETE & COMPUTATIONAL GEOMETRY, 2014, 52 (03) : 551 - 582