A host-based security assessment architecture for effective leveraging of shared knowledge

dc.contributor.authorRakshit, Abhishek
dc.date.accessioned2009-03-16T15:08:06Z
dc.date.available2009-03-16T15:08:06Z
dc.date.graduationmonthMayen
dc.date.issued2009-03-16T15:08:06Z
dc.date.published2009en
dc.description.abstractSecurity scanning performed on computer systems is an important step to identify and assess potential vulnerabilities in an enterprise network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate knowledge from multiple security knowledge sources to discover all the security problems present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. It is not easy to incorporate new security analysis tools and/or various security knowlege- bases in the conventional approach, since this would entail installing new agents on every host in the enterprise network. This report presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. At the same time, the architecture also allows for leveraging third-party security knowledge more efficiently and makes it easier to incorporate new security tools. In our work, we implemented the scanning architecture in the context of an enterprise-level security analyzer. The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). We empirically show that the proposed architecture is potent in its ability to comprehensively leverage third-party security knowledge, and is flexible to support various higher-level security analysis.
dc.description.advisorXinming (Simon) Ouen
dc.description.degreeMaster of Scienceen
dc.description.departmentDepartment of Computing and Information Sciencesen
dc.description.levelMastersen
dc.identifier.urihttp://hdl.handle.net/2097/1296
dc.language.isoen_USen
dc.publisherKansas State Universityen
dc.subjectVulnerability analysisen
dc.subjectNetwork securityen
dc.subject.umiComputer Science (0984)en
dc.titleA host-based security assessment architecture for effective leveraging of shared knowledgeen
dc.typeReporten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AbhishekRakshit2009.pdf
Size:
501.52 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.69 KB
Format:
Item-specific license agreed upon to submission
Description: