A Software Engineering Approach for Vulnerability Analysis

نویسندگان

  • D. Rakesh
  • R. Vignesh
چکیده

Due to the increasing dependency on networked computer system, it is important to make a network reliable and dependent. This is even more relevant as new threats of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for the automatic discovery of vulnerabilities in software components. The proposed methodology, implemented in XDoS & TCP/IP, follows an approach similar to hackers and security analysts to discover vulnerabilities in network-connected servers. To assess the usefulness of this approach, several attack injections are made in POP and IMAP servers. XDetector uses a specification of the server’s communication protocol. Then, while it injects these attacks through the network, it monitors the execution of the server in the target system and the responses returned to the clients. If any abnormality is detected, then the corresponding client’s connection is terminated by the XDetector to prevent any damage to the server and the faulty client can be made secure using traditional debugging tools. KeywordsSoftware Engineering, Attack Injection, Testing and Debugging, XDoS, POP & IMAP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Towards Analyzing Security-Critical Software During Development

We describe an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious threats during software development. Traditionally, security analysis has been applied at the network system level, after release, using tiger team approaches. After a successful tiger team penetration, speciic system vulnerabilities are patched. We make a case for applyin...

متن کامل

Investigating the vulnerability downstream area of Taleghan dam due to dam failure

Due to the immense damage caused by dam failure, especially dams constructed near large cities, it is necessary to consider the breaking phenomena as well as studying and designing different parts of the dam. For this purpose, the hydrograph of the outflow due to dam failure must be identified according to size of the fracture and then flood routing, and flood zone must be determined based on t...

متن کامل

Probabilistic Approach to the Seismic Vulnerability of RC Frame Structures by the Development of Analytical Fragility Curves

Fragility curves are very useful in quantifying the physical and economic damage of buildings that have undergone an earthquake. This paper presents the development of analytical fragility curves representative of mid-rise residential structures built with reinforced concrete, taking into account the specific structural characteristics of Algerian buildings. The derivation of the analytical fra...

متن کامل

Liquefaction Hazard assessment using Horizontal-to-Vertical Spectral Ratio of Microtremor

In this paper, the spectral ratio of mmicrotremor, HSVR, is presented for estimating the liquefaction potential of layered soil in the coastal area of the Persian Gulf, which consists of a hard sandstone layer situated between two saturated sandy layers. The surface layer is thin, with a thickness between 2 and 5 meters. The purpose of this paper is to identify the relation between the liquefac...

متن کامل

A Trend Analysis of Vulnerabilities

Software vulnerabilities exist and will continue to do so. Every week, a new vulnerability gains popular attention, is discussed at length in mailing lists, and hopefully gets patched by the vendor before exploits and attack tools start appearing. But there is little evidence that we are learning from our mistakes. Sharing of vulnerability information through public databases has been possible ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011