CA2388306A1 - Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees - Google Patents
Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees Download PDFInfo
- Publication number
- CA2388306A1 CA2388306A1 CA002388306A CA2388306A CA2388306A1 CA 2388306 A1 CA2388306 A1 CA 2388306A1 CA 002388306 A CA002388306 A CA 002388306A CA 2388306 A CA2388306 A CA 2388306A CA 2388306 A1 CA2388306 A1 CA 2388306A1
- Authority
- CA
- Canada
- Prior art keywords
- computer
- data
- data communication
- communication
- storage means
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
La présente invention concerne un procédé de fonctionnement d'un système d'ordinateurs, aussi bien que le système d'ordinateurs, destiné à tester la sécurité d'accès d'ordinateurs connectés à un réseau de communication de données. La sécurité du système d'ordinateurs lui-même est améliorée par réalisation de parties individuelles d'un test complet sur un ou plusieurs ordinateurs à tester connectés temporairement à un ordinateur ordonnanceur auquel sont communiqués les résultats des tests partiels effectués sur le ou les ordinateurs testés. Ainsi, le risque d'accès non autorisé aux données de test hautement sensible est diminué. Une série de tests successifs comprend un balayage de recherche de ports de communication ouverts, suivi d'une procédure d'identification destinée à identifier les protocoles de communication des ports de communication, après quoi la sécurité d'accès des ports de communication, ouverts et identifiés, est testée.
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DKPA199901584 | 1999-11-03 | ||
DKPA199901584 | 1999-11-03 | ||
US16433299P | 1999-11-09 | 1999-11-09 | |
US60/164,332 | 1999-11-09 | ||
DKPA200001073 | 2000-07-07 | ||
DKPA200001073 | 2000-07-07 | ||
PCT/DK2000/000616 WO2001033353A2 (fr) | 1999-11-03 | 2000-11-03 | Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2388306A1 true CA2388306A1 (fr) | 2001-05-10 |
Family
ID=27221342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002388306A Abandoned CA2388306A1 (fr) | 1999-11-03 | 2000-11-03 | Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1232626A2 (fr) |
JP (1) | JP2003514275A (fr) |
AU (1) | AU1268601A (fr) |
CA (1) | CA2388306A1 (fr) |
WO (1) | WO2001033353A2 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220283920A1 (en) * | 2021-03-04 | 2022-09-08 | Adlink Technology Inc. | Test sequencing method, configuration generating method for devices and apparatus thereof |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7228566B2 (en) | 2001-07-10 | 2007-06-05 | Core Sdi, Incorporated | Automated computer system security compromise |
US7277937B2 (en) | 2002-07-17 | 2007-10-02 | Core Sdi, Incorporated | Distributed computing using syscall proxying |
US8874757B2 (en) | 2007-12-19 | 2014-10-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of facilitating IP connections to hosts behind middleboxes |
US20220350641A1 (en) * | 2021-04-28 | 2022-11-03 | Microsoft Technology Licensing, Llc | Securely cascading pipelines to various platforms based on targeting input |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4799153A (en) * | 1984-12-14 | 1989-01-17 | Telenet Communications Corporation | Method and apparatus for enhancing security of communications in a packet-switched data communications system |
US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
-
2000
- 2000-11-03 CA CA002388306A patent/CA2388306A1/fr not_active Abandoned
- 2000-11-03 AU AU12686/01A patent/AU1268601A/en not_active Abandoned
- 2000-11-03 JP JP2001535781A patent/JP2003514275A/ja active Pending
- 2000-11-03 WO PCT/DK2000/000616 patent/WO2001033353A2/fr not_active Application Discontinuation
- 2000-11-03 EP EP00974341A patent/EP1232626A2/fr not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220283920A1 (en) * | 2021-03-04 | 2022-09-08 | Adlink Technology Inc. | Test sequencing method, configuration generating method for devices and apparatus thereof |
US11537485B2 (en) * | 2021-03-04 | 2022-12-27 | Adlink Technology Inc. | Test sequencing method, configuration generating method, and configuration generating apparatus for testing devices according to their communication protocols |
Also Published As
Publication number | Publication date |
---|---|
WO2001033353A3 (fr) | 2001-12-06 |
JP2003514275A (ja) | 2003-04-15 |
EP1232626A2 (fr) | 2002-08-21 |
AU1268601A (en) | 2001-05-14 |
WO2001033353A2 (fr) | 2001-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7761918B2 (en) | System and method for scanning a network | |
US8286249B2 (en) | Attack correlation using marked information | |
US7801980B1 (en) | Systems and methods for determining characteristics of a network | |
US7317693B1 (en) | Systems and methods for determining the network topology of a network | |
US8555393B2 (en) | Automated testing for security vulnerabilities of devices | |
Kuwatly et al. | A dynamic honeypot design for intrusion detection | |
Panjwani et al. | An experimental evaluation to determine if port scans are precursors to an attack | |
US20170149816A1 (en) | Method and Apparatus for Detecting a Change in Security Status of a Target | |
US20050125697A1 (en) | Device for checking firewall policy | |
EP1956463A2 (fr) | Procédé et appareil pour sécurité de réseau basée sur un état de sécurité de dispositif | |
WO2001099343A2 (fr) | Description du fonctionnement interne d'un controleur reseau | |
WO2005101789A1 (fr) | Systeme d'evaluation en temps reel de la vulnerabilite d'un dispositif/hote a partir d'un reseau | |
Deraison et al. | Passive vulnerability scanning: Introduction to NeVO | |
Terplan | Intranet performance management | |
Anderson | Introduction to nessus | |
CA2388306A1 (fr) | Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees | |
Aar et al. | Analysis of penetration testing tools | |
Deri et al. | Monitoring networks using ntop | |
He et al. | Network penetration testing | |
Gunnarsson et al. | Muninn: monitoring changes in the Icelandic Internet through repeated port scanning | |
Deraison et al. | Passive vulnerability scanning introduction | |
Turner | Wireless Security and Monitoring for the Home Network | |
Deraison et al. | Using Nessus to detect wireless access points | |
Terlegård | Design of a Secure Network Management System | |
Duplančić et al. | Implementing Automated Vulnerability Assessment in Large Network Environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |