Mining large network reconnaissance data

Fyodor Yarochkin, Yennun Huang, Yung Li Hu, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper examines techniques for a large network infrastructure reconnaissance and dives into a real-world case study of a nation-wide passive network vulnerability assessment. The main goal of this study is to understand methods of a large network risk evaluation and conduct practical experiments using a national network. The main contribution of this paper is a non-intrusive method of a large network infrastructure reconnaissance and an application of acquired data to measure network vulnerability exposures within the analysed network. In this study our assumption is based on an estimation that actual threats come from the actively exploited vulnerabilities. Information on exploit-targeted platforms and vulnerabilities could be easily collected from a large set of malicious websites and automatically turned into signatures. We propose an automated method of building such signatures and use those to analyse the reconnaissance data set to identify ranges of vulnerable systems.

Original languageEnglish
Title of host publicationProceedings - 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013
PublisherIEEE Computer Society
Pages183-187
Number of pages5
ISBN (Print)9780769551302
DOIs
StatePublished - 2013
Externally publishedYes
Event19th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2013 - Vancouver, BC, Canada
Duration: 02 12 201304 12 2013

Publication series

NameProceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
ISSN (Print)1541-0110

Conference

Conference19th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2013
Country/TerritoryCanada
CityVancouver, BC
Period02/12/1304/12/13

Keywords

  • network security
  • reconnaissance
  • risk analysis
  • security evaluation
  • vulnerability assessment

Fingerprint

Dive into the research topics of 'Mining large network reconnaissance data'. Together they form a unique fingerprint.

Cite this