A framework for automated identification of attack scenarios on it infrastructures

dc.contributor.authorCamtepe, Seyit Ahmet
dc.contributor.authorBsufka, Karsten
dc.contributor.authorHennig, Leonhard
dc.contributor.authorSimsek, Cihan
dc.contributor.authorAlbayrak, Sahin
dc.date.accessioned2017-11-30T10:19:57Z
dc.date.available2017-11-30T10:19:57Z
dc.date.issued2012
dc.descriptionDieser Beitrag ist mit Zustimmung des Rechteinhabers aufgrund einer (DFG geförderten) Allianz- bzw. Nationallizenz frei zugänglich.de
dc.descriptionThis publication is with permission of the rights owner freely accessible due to an Alliance licence and a national licence (funded by the DFG, German Research Foundation) respectively.en
dc.description.abstractDue to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, everyday new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by malicious people to penetrate these IT infrastructures for mainly disruptingbusiness or stealing intellectual properties. Current incidents prove that it is not sufficient anymore to perform manual securitytests of the IT infrastructure based on sporadic securityaudits. Instead networks should be continuously testedagainst possible attacks. In this paper we present current resultsand challenges towards realizing automated and scalablesolutions to identify possible attack scenarios in an IT infrastructure. Namely, we define an extensible framework whichuses public vulnerability databases to identify probable multistepattacks in an IT infrastructure, and provide recommendations in the form of patching strategies, topology changes, and configuration updates.en
dc.identifier.eissn0930-5157
dc.identifier.issn1865-8342
dc.identifier.urihttps://depositonce.tu-berlin.de/handle/11303/7231
dc.identifier.urihttp://dx.doi.org/10.14279/depositonce-6507
dc.language.isoen
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subject.ddc004 Datenverarbeitung; Informatik
dc.titleA framework for automated identification of attack scenarios on it infrastructuresen
dc.typeArticle
dc.type.versionpublishedVersion
dcterms.bibliographicCitation.doi10.1515/pik-2012-0005piko.2012.35.1.25
dcterms.bibliographicCitation.issue1
dcterms.bibliographicCitation.journaltitlePraxis der Informationsverarbeitung und Kommunikation
dcterms.bibliographicCitation.originalpublishernameDe Gruyter
dcterms.bibliographicCitation.originalpublisherplaceBerlin [u.a.]
dcterms.bibliographicCitation.pageend31
dcterms.bibliographicCitation.pagestart25
dcterms.bibliographicCitation.volume35
tub.accessrights.dnbdomain
tub.affiliationFak. 4 Elektrotechnik und Informatik::Inst. Wirtschaftsinformatik und Quantitative Methodende
tub.affiliation.facultyFak. 4 Elektrotechnik und Informatikde
tub.affiliation.instituteInst. Wirtschaftsinformatik und Quantitative Methodende
tub.publisher.universityorinstitutionTechnische Universität Berlin

Files

Original bundle
Now showing 1 - 1 of 1
Loading…
Thumbnail Image
Name:
pik-2012-0005.pdf
Size:
227.88 KB
Format:
Adobe Portable Document Format

Collections