2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.88
|View full text |Cite
|
Sign up to set email alerts
|

GVScan: Scanning Networks for Global Vulnerabilities

Abstract: A global vulnerability is a set of vulnerabilities in one or several nodes of an ICT infrastructure. These vulnerabilities enable some attacks that may be sequentialized so that the privileges that each attack requires are acquired through the previous ones. Current vulnerability scanners cannot discover global vulnerabilities because they analyze each node in isolation, without correlating the vulnerabilities in the same or in distinct nodes. To discover global vulnerabilities, an analysis has to correlate no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Therefore global graph measures such as the number of vertices and edges have been introduced to study network connectivity performance under different attack strategies (Holme et al 2002). Applications of such theories can be found in the Information & Communication Technology (ICT) and the power sectors where fictional or real networks are studied (Baiardi & Corò 2013;Bompard et al 2013;Mao et al 2009;Matisziw et al 2009).…”
Section: Infrastructure Network Vulnerabilitymentioning
confidence: 99%
“…Therefore global graph measures such as the number of vertices and edges have been introduced to study network connectivity performance under different attack strategies (Holme et al 2002). Applications of such theories can be found in the Information & Communication Technology (ICT) and the power sectors where fictional or real networks are studied (Baiardi & Corò 2013;Bompard et al 2013;Mao et al 2009;Matisziw et al 2009).…”
Section: Infrastructure Network Vulnerabilitymentioning
confidence: 99%
“…The builder deduces from the CVE description of v and from its common vulnerability scoring system score other attributes of the attacks that v enables such as the pre‐condition and post‐condition, the success probabilities and the execution time. We refer to for a detailed discussion of the current implementation of the builder and the accuracy of the classification.…”
Section: Haruspex Suite: Risk Assessmentmentioning
confidence: 99%
“…Haruspex is a suite of tools that supports the proposed approach. Some tools of the suite build the infrastructure, and the agent models starting from the output of a vulnerability scanning and by interacting with the user.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We discuss the design of GVScan (Baiardi et al 2013a), our tool that builds the description of the target system, of its components, their vulnerabilities and the corresponding attacks. Since most of the scenarios of interest for an assessment differ because of the agents, the availability of a tool such as GVScan strongly reduces the complexity of the assessment.…”
Section: Building the Scenario Descriptionmentioning
confidence: 99%