Network vulnerability analysis

被引:0
|
作者
Skaggs, B [1 ]
Blackburn, B [1 ]
Manes, G [1 ]
Shenoi, S [1 ]
机构
[1] Univ Tulsa, Dept Comp Sci, Ctr Informat Secur, Tulsa, OK 74104 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing volume of attacks on the Internet has grown demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. Scanners must be able to function on a variety of networks: Internet (IP), SS7, wireless, and converged networks. Scanners should be extendable and upgradeable to facilitate use by a broad spectrum of users and platforms; such flexibility allows users to keep up with current hacker technology. This paper describes one such scanner, referred to as NetGlean.
引用
收藏
页码:493 / 495
页数:3
相关论文
共 50 条
  • [41] NetVA: an R package for network vulnerability and influence analysis
    Kumar, Swapnil
    Pauline, Grace
    Vindal, Vaibhav
    JOURNAL OF BIOMOLECULAR STRUCTURE & DYNAMICS, 2024,
  • [42] Topological Characteristics and Vulnerability Analysis of Rural Traffic Network
    Zhu, Xia
    Song, Weidong
    Gao, Lin
    JOURNAL OF SENSORS, 2019, 2019
  • [43] Transdiagnostic vulnerability factors in eating disorders: A network analysis
    Vervaet, Myriam
    Puttevils, Louise
    Hoekstra, Ria H. A.
    Fried, Eiko
    Vanderhasselt, Marie-Anne
    EUROPEAN EATING DISORDERS REVIEW, 2021, 29 (01) : 86 - 100
  • [44] Union of Random Minkowski Sums and Network Vulnerability Analysis
    Pankaj K. Agarwal
    Sariel Har-Peled
    Haim Kaplan
    Micha Sharir
    Discrete & Computational Geometry, 2014, 52 : 551 - 582
  • [45] Network vulnerability analysis of the Player command and control protocol
    Hagen, John T.
    Mullins, Barry E.
    International Journal of Security and Networks, 2014, 9 (03) : 154 - 166
  • [46] APPLICATION OF VULNERABILITY ANALYSIS IN ELECTRIC POWER COMMUNICATION NETWORK
    Gao, Hui-Sheng
    Guo, Jing
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2072 - 2077
  • [47] Vulnerability Analysis Method Based on Network and Copula Entropy
    Chen, Mengyuan
    Liu, Jilan
    Zhang, Ning
    Zheng, Yichao
    ENTROPY, 2024, 26 (03)
  • [48] A Spatially Weighted Degree Model for Network Vulnerability Analysis
    Wan Neng
    Zhan, F. Benjamin
    Cai Zhongliang
    GEO-SPATIAL INFORMATION SCIENCE, 2011, 14 (04) : 274 - 281
  • [49] Analysis of Transportation Network Vulnerability Under Flooding Disasters
    Chen, Xian-Zhe
    Lu, Qing-Chang
    Pang, Zhong-Ren
    Ash, John Eugene
    TRANSPORTATION RESEARCH RECORD, 2015, (2532) : 37 - 44
  • [50] Vulnerability analysis of faults/attacks in Network Centric Systems
    Hariri, S
    Dharmagadda, T
    Raghavendra, CS
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 256 - 261