Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.2.111

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL)  

김수용 (국가보안기술연구소)
서정석 (한국과학기술원 소프트웨어공학 연구실)
조상현 (한국과학기술원 소프트웨어공학 연구실)
김한성 (한국과학기술원 소프트웨어공학 연구실)
차성덕 (한국과학기술원)
Abstract
Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.
Keywords
ISMAEL;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Toward a Taxonomy of Network Security Assessment Techniques /
[ Shostack, A.;S. Blake ] / Proceedings of the 1999 Black Hat Briefings
2 /
[ 박정현(외 35명) ] / 취약성 점검기술 및 침입시도 탐지기술 개발 제 1차년도 연구개발 보고서
3 /
[ Baldwin, R. W. ] / Rule-Based Analysis of Computer Security
4 /
[ Farmer, D.;W. Venema ] / Security Administrator Tool for Analyzing Networks
5 The COPS Security Checker System /
[ Daniel Farmer;Eugene H. Spafford ] / Purdue University Technical Report CSD-TR-993
6 지킴이 : 유닉스 시스템을 위한 통합 보안 점검 도구 /
[ 채홍석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤 ] / 한국 정보보호 학회 논문지   과학기술학회마을
7 /
[ 이현우;하도윤;전익수 ] / 새로운 Code Red II 웜
8 /
[ Rebecca Gurley Base ] / Intrusion Detection
9 /
[ 전익수;이완희 ] / Nimda Worm(W32/Nimda worm)
10 /
[ Renaud Deraison ] / The Nessus Attack Scripting Language Reference Guide (Version 1.0.0pre2)
11 /
[ Flodor ] / Remote OS detection via TCP/IP Stack FingerPrinting
12 /
[] / SecurityFocus
13 /
[ Renaud Deraison ] /