2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.46
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security Testing via Automated Replication of IT-Asset Topologies

Abstract: Security testing of IT-infrastructure in a production environment can have a negative impact on business processes supported by IT-assets. A testbed can be used to provide an alternate testing environment in order to mitigate this impact. Unfortunately, for small and medium enterprises, maintaining a physical testbed and its consistency with the production environment is a cost-intensive task. In this paper, we present the Infrastructure Replication Process (IRP) and a corresponding Topology Editor, to provide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
2
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
1
2
0
Order By: Relevance
“…This method is used as a substitute for introducing real misconfiguration and for using real active probes with ICMP in the existing infrastructure. The work presented in [5] and [6] shows that this approach is feasible and the proof-ofconcept presented in this paper produces results identical to actual emitting ICMP probes in the production network that is represented.…”
Section: Evaluation Methodssupporting
confidence: 52%
See 2 more Smart Citations
“…This method is used as a substitute for introducing real misconfiguration and for using real active probes with ICMP in the existing infrastructure. The work presented in [5] and [6] shows that this approach is feasible and the proof-ofconcept presented in this paper produces results identical to actual emitting ICMP probes in the production network that is represented.…”
Section: Evaluation Methodssupporting
confidence: 52%
“…Parallelizing active probes according to available processing resources can mitigate this effect. Reachability could be inferred completely without any active probing using the IO-framework exclusively, but the representation provided by the IO-framework, which is acquired as a snapshot [6], could already be outdated. In this case, the misconfiguration leading to the degradation of availability cannot be inferred.…”
Section: Evaluation Resultsmentioning
confidence: 99%
See 1 more Smart Citation