WO2007088120A3 - Automated evaluation of network security - Google Patents

Automated evaluation of network security

Info

Publication number
WO2007088120A3
WO2007088120A3 PCT/EP2007/050604 EP2007050604W WO2007088120A3 WO 2007088120 A3 WO2007088120 A3 WO 2007088120A3 EP 2007050604 W EP2007050604 W EP 2007050604W WO 2007088120 A3 WO2007088120 A3 WO 2007088120A3
Authority
WO
Grant status
Application
Patent type
Prior art keywords
network
sensitive data
method
security
data
Prior art date
Application number
PCT/EP2007/050604
Other languages
German (de)
French (fr)
Other versions
WO2007088120A2 (en )
Inventor
Joachim Charzinski
Bernhard Petri
Djordje Stamenkovic
Wilhelm Wimmreuter
Original Assignee
Joachim Charzinski
Bernhard Petri
Siemens Ag
Djordje Stamenkovic
Wilhelm Wimmreuter
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The invention relates to a method for automatically evaluating the security of a network, in particular a data network, to prevent the spying out of sensitive data. According to said method, the network and its associated connections, together with its services, network elements containing weak points and sensitive data are represented as a network model and the attainability of the sensitive data from the exterior is tested. In the event of the sensitive data being attainable, the attack vectors indicating a potential attack on the sensitive data are given. The method according to the invention permits the autonomous and rapid testing of the influence of newly identified weak points on the security of sensitive data or systems in the network.
PCT/EP2007/050604 2006-01-31 2007-01-22 Automated evaluation of network security WO2007088120A3 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE102006004445 2006-01-31
DE102006004445.2 2006-01-31

Publications (2)

Publication Number Publication Date
WO2007088120A2 true WO2007088120A2 (en) 2007-08-09
WO2007088120A3 true true WO2007088120A3 (en) 2007-11-15

Family

ID=38327070

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/050604 WO2007088120A3 (en) 2006-01-31 2007-01-22 Automated evaluation of network security

Country Status (1)

Country Link
WO (1) WO2007088120A3 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182582A1 (en) * 2002-03-19 2003-09-25 Park Jong Sou Network security simulation system
WO2004031953A1 (en) * 2002-10-01 2004-04-15 Skybox Security, Ltd. System and method for risk detection and analysis in a computer network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182582A1 (en) * 2002-03-19 2003-09-25 Park Jong Sou Network security simulation system
WO2004031953A1 (en) * 2002-10-01 2004-04-15 Skybox Security, Ltd. System and method for risk detection and analysis in a computer network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GERRIT ROTHMAIER ET AL: "A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks" FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2005 LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER-VERLAG, BE, Bd. 3731, 2005, Seiten 247-260, XP019020857 ISBN: 3-540-29189-X *
LI YONGJIAN ET AL: "Using SPIN to model cryptographic protocols" INFORMATION TECHNOLOGY: CODING AND COMPUTING, 2004. PROCEEDINGS. ITCC 2004. INTERNATIONAL CONFERENCE ON LAS VEGAS, NV, USA APRIL 5-7, 2004, PISCATAWAY, NJ, USA,IEEE, Bd. 2, 5. April 2004 (2004-04-05), Seiten 741-745, XP010697313 ISBN: 0-7695-2108-8 *

Also Published As

Publication number Publication date Type
WO2007088120A2 (en) 2007-08-09 application

Similar Documents

Publication Publication Date Title
Surroca et al. Stakeholder pressure on MNEs and the transfer of socially irresponsible practices to subsidiaries
Reynders et al. Output-only structural health monitoring in changing environmental conditions by means of nonlinear system identification
De Sanctis et al. Real-time identification of possible contamination sources using network backtracking methods
Yuen et al. Real‐time system identification: an algorithm for simultaneous model class selection and parametric identification
Kim et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach.
Wang et al. Robust state estimation and fault diagnosis for uncertain hybrid systems
Iervolino et al. Closed‐form aftershock reliability of damage‐cumulating elastic‐perfectly‐plastic systems
Zhao et al. Hybrid identification method for multi-story buildings with unknown ground motion: theory
US20130030724A1 (en) Detection of pipeline contaminants
Ostadsharif Memar et al. The Max EWMAMS control chart for joint monitoring of process mean and variance with individual observations
Jones et al. A system‐aware cyber security architecture
US20100010708A1 (en) Methods of Identifying Flight Profiles in Aircraft Maintenance Operations
Carvalho et al. Generalized robust diagnosability of discrete event systems
Wang et al. Structural damage detection using autoregressive-model-incorporating multivariate exponentially weighted moving average control chart
US20110126285A1 (en) Internet site security system and method thereto
Kuhnel et al. Compatibility and reuse in component-based systems via type and unit inference
Kriaa et al. Safety and security interactions modeling using the BDMP formalism: case study of a pipeline
Li et al. Degradation-path model for wood pole asset management
Nagin et al. The interrelationship of temporally distinct risk markers and the transition from childhood physical aggression to adolescent violent delinquency.
Bernardi et al. Building Petri net scenarios for dependable automation systems
Vento et al. Fault detection and isolation of hybrid system using diagnosers that combine discrete and continuous dynamics
WO2009072211A1 (en) Banknote identifying device and banknote identifying method
Ciloglu et al. Impacts of epistemic uncertainty in operational modal analysis
Chao et al. Statistical challenges of evaluating diversity patterns across environmental gradients in mega‐diverse communities
US20120290247A1 (en) System and Method of Sensor Installation Validation

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07726214

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct app. not ent. europ. phase

Ref document number: 07726214

Country of ref document: EP

Kind code of ref document: A2