Skip to main content

SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks

  • Conference paper
Information Networking. Networking Technologies for Broadband and Mobile Networks (ICOIN 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3090))

Included in the following conference series:

  • 392 Accesses

Abstract

Active networks are novel approach to providing the flexibility in the network and service by allowing the network infrastructure to be programmable by using active packet, in which a traditional packet is replaced by a program which controls a behavior of nodes in the network. However, active packet may create new vulnerabilities at active node and attacks using those vulnerabilities can spread over network by mobility of active packet easily and rapidly. To be beforehand with preventing these attacks, we need the more scalable model than existing vulnerability analysis model. We present the Scalable Vulnerability Analysis Model which can manage vulnerable nodes quickly and efficiently in active networks. This approach provides good scalability by distributed vulnerability checking mechanism based on policy and fast adaptability by automated deploying mechanism of new vulnerability checking code. This approach will be suitable in large scale active networks.

This study was partially supported by a grant of the Korea Health 21 R&D Project, Ministry of Health & Welfare, Republic of Korea(02-PJ3-PG6-EV08-0001)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tennenhouse, D.L., et al.: A Survey of Active Network Research. IEEE communications magazine (January 1997)

    Google Scholar 

  2. Wetherall, D., et al.: ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. Proc. of IEEE OPENARCH (April 1998)

    Google Scholar 

  3. Kwon, H.C., et al.: A Performance Evaluation of Mobile Agent for Network Management. In: The Transaction of the KIPS, Korea, February 2001, vol. 8-C(1) (2001)

    Google Scholar 

  4. Internet Security System: Internet Security Systems, Network and Host-based Vulnerability Assessment, Technical White Paper

    Google Scholar 

  5. Yang, J.S., et al.: A Study on Security Vulnerability of Active Network. In: Proc. of the 19th KIPS Fall Conference, Korea (May 2003)

    Google Scholar 

  6. Calvert, K., et al.: Architectural Framework for Active Networks. AN Working Group (July 1999)

    Google Scholar 

  7. Psounis, K.: Active Networks: Applications, Security, Safety, and Architectures. In: IEEE Communications Surveys, First Quarter (1999)

    Google Scholar 

  8. Murphy, S.L.: Secure Active Network prototypes. In: Proceedings of the DARPA Active Networks Conference and Exposition (DANCE 2002) (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, Y.J., Yang, J.S., Chang, B.H., Chung, T.M. (2004). SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25978-7_86

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23034-2

  • Online ISBN: 978-3-540-25978-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics