首页> 美国政府科技报告 >Network Exploration and Vulnerability Assessment Using a Combined 'Blackbox' and 'Whitebox' Analysis Approach
【24h】

Network Exploration and Vulnerability Assessment Using a Combined 'Blackbox' and 'Whitebox' Analysis Approach

机译:使用组合的“Blackbox”和“Whitebox”分析方法进行网络探索和漏洞评估

获取原文

摘要

The increased reliance on advanced networking technologies to integrate cutting-edge capabilities has posed tremendous challenges in assuring user legitimacy and preserving the integrity of our network landscape. Without proper network accountability and holistic vulnerability assessment, insider threats can exploit the security vulnerabilities that result from creating an integrated system-of-systems. To detect security illegitimacies, such as unauthorized connections, network security administrators need to have a comprehensive network map to identify potential entry points. This thesis proposes a systematic way to combine 'black-box' and 'white-box' analysis for network exploration and vulnerability assessment. In the analytical model design, a modular approach is adopted to select tools and techniques from both analysis approaches. These tools and techniques are used to construct a network map based on a pre-defined set of criteria that define the type of essential network information to be annotated on the map. The 'black-box' and 'white-box' analysis approaches were found to be complementary. For example, 'black-box' analysis was able to map active hosts and networking devices, but 'white-box' analysis was able to detect those that are inactive or do not respond to pings. Moreover, 'black-box' analysis provides a focal point for 'white-box' analysis approach to derive in-depth information regarding unauthorized connections.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号