Skip to main content

Fault Injection Tool for Network Security Evaluation

  • Conference paper
Book cover Dependable Computing (LADC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2847))

Included in the following conference series:

Abstract

Lately, a great number of new security tools have been developed to solve the problems of IP networks, but some doubts were raised about the efficiency of those systems. There are some techniques used to evaluate the vulnerabilities of a network, but their results are limited and few tools aim to facilitate and automate the evaluation of security network mechanisms. This article presents a network fault injection system especially created to test network security equipment, aiming to solve the inexistence of this type of tool and to fill the gap between packet injectors and vulnerability scanners.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bace, R.: An Introduction to Intrusion Detection&Assessment, Scotts Valley: Infidel (1999)

    Google Scholar 

  2. Deraison, R.: Nessus Security Scanner (2000), http://www.nessus.org/ (December 2002)

  3. Grimes, M.: Nemesis Packet Injection (2000), http://www.packetfactory.net/Projects/nemesis/ (December 2002)

  4. Hsueh, M., Tsai, T.K., Iyer, R.K.: Fault Injection Techniques and Tools. Computer 30(04), 75–82 (1997)

    Article  Google Scholar 

  5. McHugh, J., Christie, A., Allen, J.: Defending Yourself: The Role of Intrusion Detection Systems. IEEE Software Computer 17(5), 42–51 (2000)

    Article  Google Scholar 

  6. Ricketts, M.: SendIP (2000), http://www.earth.li/projectpurple/progs/sendip.html (December 2002)

  7. Sanfilippo, S.: Hping (2001), http://www.hping.org (December 2002)

  8. Todd, B.: Security Auditor’s Research Assistant (1999), http://www-arc.com/sara/index.shtml (December 2002)

  9. WorldWide Digital Security, Inc Security Administrator’s Integrated Network Tool (2000), http://www.wwdsi.com/saint/ (December 2002)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herrmann Wanner, P.C., Weber, R.F. (2003). Fault Injection Tool for Network Security Evaluation. In: de Lemos, R., Weber, T.S., Camargo, J.B. (eds) Dependable Computing. LADC 2003. Lecture Notes in Computer Science, vol 2847. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45214-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45214-0_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20224-0

  • Online ISBN: 978-3-540-45214-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics