CA2388306A1 - Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees - Google Patents

Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees Download PDF

Info

Publication number
CA2388306A1
CA2388306A1 CA002388306A CA2388306A CA2388306A1 CA 2388306 A1 CA2388306 A1 CA 2388306A1 CA 002388306 A CA002388306 A CA 002388306A CA 2388306 A CA2388306 A CA 2388306A CA 2388306 A1 CA2388306 A1 CA 2388306A1
Authority
CA
Canada
Prior art keywords
computer
data
data communication
communication
storage means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002388306A
Other languages
English (en)
Inventor
Ulf Munkedal
Aage Hejgaard Vestergaard
Bo Norgaard
Steen Varsted
Lars Neupart
Peter Grundl
Ken Willen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
VIGILANTE AS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VIGILANTE AS filed Critical VIGILANTE AS
Publication of CA2388306A1 publication Critical patent/CA2388306A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

La présente invention concerne un procédé de fonctionnement d'un système d'ordinateurs, aussi bien que le système d'ordinateurs, destiné à tester la sécurité d'accès d'ordinateurs connectés à un réseau de communication de données. La sécurité du système d'ordinateurs lui-même est améliorée par réalisation de parties individuelles d'un test complet sur un ou plusieurs ordinateurs à tester connectés temporairement à un ordinateur ordonnanceur auquel sont communiqués les résultats des tests partiels effectués sur le ou les ordinateurs testés. Ainsi, le risque d'accès non autorisé aux données de test hautement sensible est diminué. Une série de tests successifs comprend un balayage de recherche de ports de communication ouverts, suivi d'une procédure d'identification destinée à identifier les protocoles de communication des ports de communication, après quoi la sécurité d'accès des ports de communication, ouverts et identifiés, est testée.
CA002388306A 1999-11-03 2000-11-03 Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees Abandoned CA2388306A1 (fr)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
DKPA199901584 1999-11-03
DKPA199901584 1999-11-03
US16433299P 1999-11-09 1999-11-09
US60/164,332 1999-11-09
DKPA200001073 2000-07-07
DKPA200001073 2000-07-07
PCT/DK2000/000616 WO2001033353A2 (fr) 1999-11-03 2000-11-03 Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees

Publications (1)

Publication Number Publication Date
CA2388306A1 true CA2388306A1 (fr) 2001-05-10

Family

ID=27221342

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002388306A Abandoned CA2388306A1 (fr) 1999-11-03 2000-11-03 Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees

Country Status (5)

Country Link
EP (1) EP1232626A2 (fr)
JP (1) JP2003514275A (fr)
AU (1) AU1268601A (fr)
CA (1) CA2388306A1 (fr)
WO (1) WO2001033353A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220283920A1 (en) * 2021-03-04 2022-09-08 Adlink Technology Inc. Test sequencing method, configuration generating method for devices and apparatus thereof

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7228566B2 (en) 2001-07-10 2007-06-05 Core Sdi, Incorporated Automated computer system security compromise
US7277937B2 (en) 2002-07-17 2007-10-02 Core Sdi, Incorporated Distributed computing using syscall proxying
US8874757B2 (en) 2007-12-19 2014-10-28 Telefonaktiebolaget Lm Ericsson (Publ) Method of facilitating IP connections to hosts behind middleboxes
US20220350641A1 (en) * 2021-04-28 2022-11-03 Microsoft Technology Licensing, Llc Securely cascading pipelines to various platforms based on targeting input

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4799153A (en) * 1984-12-14 1989-01-17 Telenet Communications Corporation Method and apparatus for enhancing security of communications in a packet-switched data communications system
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220283920A1 (en) * 2021-03-04 2022-09-08 Adlink Technology Inc. Test sequencing method, configuration generating method for devices and apparatus thereof
US11537485B2 (en) * 2021-03-04 2022-12-27 Adlink Technology Inc. Test sequencing method, configuration generating method, and configuration generating apparatus for testing devices according to their communication protocols

Also Published As

Publication number Publication date
WO2001033353A3 (fr) 2001-12-06
JP2003514275A (ja) 2003-04-15
EP1232626A2 (fr) 2002-08-21
AU1268601A (en) 2001-05-14
WO2001033353A2 (fr) 2001-05-10

Similar Documents

Publication Publication Date Title
US7761918B2 (en) System and method for scanning a network
US8286249B2 (en) Attack correlation using marked information
US7801980B1 (en) Systems and methods for determining characteristics of a network
US7317693B1 (en) Systems and methods for determining the network topology of a network
US8555393B2 (en) Automated testing for security vulnerabilities of devices
Kuwatly et al. A dynamic honeypot design for intrusion detection
Panjwani et al. An experimental evaluation to determine if port scans are precursors to an attack
US20170149816A1 (en) Method and Apparatus for Detecting a Change in Security Status of a Target
US20050125697A1 (en) Device for checking firewall policy
EP1956463A2 (fr) Procédé et appareil pour sécurité de réseau basée sur un état de sécurité de dispositif
WO2001099343A2 (fr) Description du fonctionnement interne d'un controleur reseau
WO2005101789A1 (fr) Systeme d'evaluation en temps reel de la vulnerabilite d'un dispositif/hote a partir d'un reseau
Deraison et al. Passive vulnerability scanning: Introduction to NeVO
Terplan Intranet performance management
Anderson Introduction to nessus
CA2388306A1 (fr) Test de securite d'acces d'ordinateurs sur un reseau de communication de donnees
Aar et al. Analysis of penetration testing tools
Deri et al. Monitoring networks using ntop
He et al. Network penetration testing
Gunnarsson et al. Muninn: monitoring changes in the Icelandic Internet through repeated port scanning
Deraison et al. Passive vulnerability scanning introduction
Turner Wireless Security and Monitoring for the Home Network
Deraison et al. Using Nessus to detect wireless access points
Terlegård Design of a Secure Network Management System
Duplančić et al. Implementing Automated Vulnerability Assessment in Large Network Environments

Legal Events

Date Code Title Description
FZDE Dead