Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

Ziyad S. Al-Salloum, S. Wolthusen
{"title":"Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination","authors":"Ziyad S. Al-Salloum, S. Wolthusen","doi":"10.1109/IMF.2009.14","DOIUrl":null,"url":null,"abstract":"Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether these are known to an organization’s asset database or not. This is particularly critical if a security incident is in progress and the exposure to a vulnerability must be assessed and potentially mitigated as quickly and completely as possible. In this paper we therefore propose a probabilistic discovery and mitigation algorithm traversing a network with only knowledge of the immediate network neighborhood as can be obtained from passive observation of the LLDP protocol to minimize bandwidth consumption in con- junction with persistent agents deployed by the traversal to capture transient or intermittently active nodes and provide an analysis of the algorithm’s efficiency under different topologies and taking into account link failure as well as inconclusive or failed discovery and mitigation operation probabilities.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMF.2009.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether these are known to an organization’s asset database or not. This is particularly critical if a security incident is in progress and the exposure to a vulnerability must be assessed and potentially mitigated as quickly and completely as possible. In this paper we therefore propose a probabilistic discovery and mitigation algorithm traversing a network with only knowledge of the immediate network neighborhood as can be obtained from passive observation of the LLDP protocol to minimize bandwidth consumption in con- junction with persistent agents deployed by the traversal to capture transient or intermittently active nodes and provide an analysis of the algorithm’s efficiency under different topologies and taking into account link failure as well as inconclusive or failed discovery and mitigation operation probabilities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
半自治链路层漏洞发现和缓解传播
风险和漏洞管理是维护任何重要网络的关键任务,但由于互联网的动态性、瞬时连接和间歇性连接的虚拟机的使用,风险和漏洞管理变得越来越困难,而真实主机和虚拟主机都可能存在漏洞,必须解决这些漏洞,以保护易受攻击的主机及其环境,无论这些漏洞是否为组织的资产数据库所知。如果正在发生安全事件,并且必须对暴露于漏洞的情况进行评估,并尽可能迅速和彻底地进行潜在的缓解,那么这一点尤其重要。因此,在本文中,我们提出了一种概率发现和缓解算法,该算法仅具有直接网络邻居的知识,可以从LLDP协议的被动观察中获得,以最大限度地减少带宽消耗,并与遍历部署的持久代理相结合,以捕获瞬态或间歇活动节点,并提供了算法在不同拓扑下的效率分析,并考虑到链路故障以及不确定或失败的发现和缓解操作概率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Workshop: Digital Discovery with Bootable CDs Self-Forensics Through Case Studies of Small-to-Medium Software Systems Technique to Interrogate an Image of RAM Fast User Classifying to Establish Forensic Analysis Priorities Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1