Skip to main content

The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations

  • Conference paper
Book cover Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

Active Networks (ANs) are novel approaches to providing flexibility in the both network and service. ANs are realized with deployment of active nodes over network. For composing an active node, new components are required but may invite potential vulnerabilities. Many network-based attacks using vulnerabilities of new components can easily spread over network, because of the mobility of active packets. In order to prevent those attacks at the early stages, vulnerability assessment model for active networks is required. Because existing vulnerability models have limitations to be applied in ANs, we propose the Scalable Vulnerability Assessment Model (SVAM) that can efficiently manage vulnerable nodes in ANs. This approach provides good scalability by distributed vulnerability scanning mechanism based on policy and fast adaptability by automated deployment of new vulnerability scanning code.

This study was partially supported by a grant of the Korea Health 21 R&D Project, Ministry of Health & Welfare, Republic of Korea(02-PJ3-PG6-EV08-0001)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AN NodeOS Working Group, NodeOS Interface Specification (November 2001)

    Google Scholar 

  2. AN Security Working Group, Security Architecture for Active Nets (November 2001)

    Google Scholar 

  3. Tennenhouse, D.L., et al.: Towards an Active Network Architecture. In: IMCN 1996 (January 1996)

    Google Scholar 

  4. Tennenhouse, D.L., et al.: A Survey of Active Network Research. IEEE communications magazine (January 1997)

    Google Scholar 

  5. Farmer, D., et al.: The COPS Security Checker System. In: SUC 1990 Proc. (June 1990)

    Google Scholar 

  6. Zamboni, D.M.: SAINT: A Security Analysis Integration Tool. In: SANS 1996 Proc. (May 1996)

    Google Scholar 

  7. Alexander, D.S., et al.: A Secure Active Network Environment Architecture. IEEE Network special Issue on Active and Controllable Network (May/June 1998)

    Google Scholar 

  8. Alexander, D.S., et al.: Safety and Security of Programmable Network Infrastructures. IEEE Communications Magazine, issue on Programmable Networks 36(10) (1998)

    Google Scholar 

  9. Wetherall, D., et al.: ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. In: IEEE OPENARCH 1998 Proc. (April 1998)

    Google Scholar 

  10. Internet Security Systems, Network and Host-based Vulnerability Assessment, Technical White Paper

    Google Scholar 

  11. Kim, H.-K., et al.: Vulnerability Management Architecture for Active Nodes. KNOM Review 5(2) (December 2002)

    Google Scholar 

  12. Calvert, K., et al.: Architectural Framework for Active Networks. ANWG (July 1999)

    Google Scholar 

  13. Psounis, K.: Active Networks: Applications, Security, Safety, and Architectures. IEEE Communications Surveys, First Quarter (1999)

    Google Scholar 

  14. Murphy, S.L.: Secure Active Network prototypes. In: DARPA DANCE 2002 Proc. (2002)

    Google Scholar 

  15. Common Vulnerabilities and Exposures homepage, http://www.cve.mitre.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, Y.J., Yang, J.S., Chang, B.H., Na, J.C., Chung, T.M. (2004). The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics