DocumentCode :
1957956
Title :
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism
Author :
Al-Salloum, Ziyad S. ; Wolthusen, Stephen D.
Author_Institution :
Inf. Security Group, Univ. of London Egham, Egham, UK
fYear :
2010
fDate :
15-18 Feb. 2010
Firstpage :
549
Lastpage :
554
Abstract :
The identification of vulnerable hosts and subsequent deployment of mitigation mechanisms such as service disabling or installation of patches is both time-critical and error-prone. This is in part owing to the fact that malicious worms can rapidly scan networks for vulnerable hosts, but is further exacerbated by the fact that network topologies are becoming more fluid and vulnerable hosts may only be visible intermittently for environments such as virtual machines or wireless edge networks. In this paper we therefore describe and evaluate an agent-based mechanism which uses the spanning tree protocol (STP) to gain knowledge of the underlying network topology to allow both rapid and resource-efficient traversal of the network by agents as well as residual scanning and mitigation techniques on edge nodes. We report performance results, comparing the mechanism against a random scanning worm and demonstrating that network immunity can be largely achieved despite a very limited warning interval. We also discuss mechanisms to protect the agent mechanism against subversion, noting that similar approaches are also increasingly deployed in case of malicious code.
Keywords :
invasive software; software agents; agent-based link-layer vulnerability discovery mechanism; agent-based mechanism; malicious worms; mitigation mechanisms; network immunity; patches installation mechanism; residual scanning technique; service disabling mechanism; spanning tree protocol; virtual machines; wireless edge networks; Availability; Computer worms; Educational institutions; IEEE news; Information security; Laboratories; Network topology; Protection; Time factors; Virtual machining; Beneficial Computer Worms; Self-replicating code; Vulnerability Discovery;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability, and Security, 2010. ARES '10 International Conference on
Conference_Location :
Krakow
Print_ISBN :
978-1-4244-5879-0
Type :
conf
DOI :
10.1109/ARES.2010.24
Filename :
5438039
Link To Document :
بازگشت