Towards Automated Vulnerability Assessment
نویسندگان
چکیده
Vulnerability assessment (VA) is a well established method for determining security weaknesses within a system. The VA process is heavily reliant on expert knowledge, something that is attributed to being in short supply. This paper explores the possibility of automating VA and demonstrates an initial proof-of-concept involving decision-making skills comparable with a human-expert. This is achieved through encoding a domain model to represent expert-like capabilities, and then using model-based VA planning to determine VA tasks. Although security evaluation is a complex task, through the help of such models, we can determine the ways to find potential vulnerabilities without an expert present. This technique allows time constrained assessments, where a ‘risk factor’ is also encoded to represent the significance of each security flaw. The ultimate goal of this work-in-progress is to realistically simulate a human vulnerability auditor. This paper demonstrates the first step towards that goal; a systematic transformation of the VA knowledge into a PDDL representation, accommodating a broad range of time constrained investigative actions. The output plan and its analysis evidently evinces many potential benefits such as increased feasibility
منابع مشابه
New Tool And Technique For Remote Operating System Fingerprinting
Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In this context, host Operating System detection must be precise, even when networks are well defended. We present an original Operating System detection method, based on temporal response analysis. As a proof of concept, we release the open source tool called RING – for...
متن کاملRevised title Approaches to climate change impact, adaptation and vulnerability assessment: towards a classification framework to serve decision-making Acknowledgements
Approaches to climate change impact, adaptation and vulnerability assessment: towards a classification framework to serve decision-making.
متن کاملIncreasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware
The fast adaptation of Cloud computing has led to an increased speedy rate of novel information technology threats. The targets of these new threats involve from large scale distributed system, such as the Large Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed systems, i.e. SCADA systems. The use of automated tools for vulnerability assessmen...
متن کاملAutomated Vulnerability Management of Computer Systems
With the continuous flood of vulnerabilities of computer systems, vulnerability management is a very important task for administrators to keep systems as secure as possible. However current manual vulnerability management by administrators is very time-consuming and error-prone. This paper proposes an open framework of automated vulnerability management that dramatically alleviates the burden o...
متن کاملAN OPTIMUM APPROACH TOWARDS SEISMIC FRAGILITY FUNCTION OF STRUCTURES THROUGH METAHEURISTIC HARMONY SEARCH ALGORITHM
Vulnerability assessment of structures encounter many uncertainties like seismic excitations intensity and response of structures. The most common approach adopted to deal with these uncertainties is vulnerability assessment through fragility functions. Fragility functions exhibit the probability of exceeding a state namely performance-level as a function of seismic intensity. A common approach...
متن کامل