New! View global litigation for patent families

WO2007088120A3 - Automated evaluation of network security - Google Patents

Automated evaluation of network security

Info

Publication number
WO2007088120A3
WO2007088120A3 PCT/EP2007/050604 EP2007050604W WO2007088120A3 WO 2007088120 A3 WO2007088120 A3 WO 2007088120A3 EP 2007050604 W EP2007050604 W EP 2007050604W WO 2007088120 A3 WO2007088120 A3 WO 2007088120A3
Authority
WO
Grant status
Application
Patent type
Prior art keywords
data
network
sensitive
security
method
Prior art date
Application number
PCT/EP2007/050604
Other languages
German (de)
French (fr)
Other versions
WO2007088120A2 (en )
Inventor
Joachim Charzinski
Bernhard Petri
Djordje Stamenkovic
Wilhelm Wimmreuter
Original Assignee
Joachim Charzinski
Bernhard Petri
Siemens Ag
Djordje Stamenkovic
Wilhelm Wimmreuter
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The invention relates to a method for automatically evaluating the security of a network, in particular a data network, to prevent the spying out of sensitive data. According to said method, the network and its associated connections, together with its services, network elements containing weak points and sensitive data are represented as a network model and the attainability of the sensitive data from the exterior is tested. In the event of the sensitive data being attainable, the attack vectors indicating a potential attack on the sensitive data are given. The method according to the invention permits the autonomous and rapid testing of the influence of newly identified weak points on the security of sensitive data or systems in the network.
PCT/EP2007/050604 2006-01-31 2007-01-22 Automated evaluation of network security WO2007088120A3 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE102006004445 2006-01-31
DE102006004445.2 2006-01-31

Publications (2)

Publication Number Publication Date
WO2007088120A2 true WO2007088120A2 (en) 2007-08-09
WO2007088120A3 true true WO2007088120A3 (en) 2007-11-15

Family

ID=38327070

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/050604 WO2007088120A3 (en) 2006-01-31 2007-01-22 Automated evaluation of network security

Country Status (1)

Country Link
WO (1) WO2007088120A3 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182582A1 (en) * 2002-03-19 2003-09-25 Park Jong Sou Network security simulation system
WO2004031953A1 (en) * 2002-10-01 2004-04-15 Skybox Security, Ltd. System and method for risk detection and analysis in a computer network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182582A1 (en) * 2002-03-19 2003-09-25 Park Jong Sou Network security simulation system
WO2004031953A1 (en) * 2002-10-01 2004-04-15 Skybox Security, Ltd. System and method for risk detection and analysis in a computer network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GERRIT ROTHMAIER ET AL: "A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks" FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2005 LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER-VERLAG, BE, Bd. 3731, 2005, Seiten 247-260, XP019020857 ISBN: 3-540-29189-X *
LI YONGJIAN ET AL: "Using SPIN to model cryptographic protocols" INFORMATION TECHNOLOGY: CODING AND COMPUTING, 2004. PROCEEDINGS. ITCC 2004. INTERNATIONAL CONFERENCE ON LAS VEGAS, NV, USA APRIL 5-7, 2004, PISCATAWAY, NJ, USA,IEEE, Bd. 2, 5. April 2004 (2004-04-05), Seiten 741-745, XP010697313 ISBN: 0-7695-2108-8 *

Also Published As

Publication number Publication date Type
WO2007088120A2 (en) 2007-08-09 application

Similar Documents

Publication Publication Date Title
Limongelli Frequency response function interpolation for damage detection under changing environment
WO2008078366A1 (en) Data verifying device, data verifying method, and data verifying program
Zhang et al. Design and analysis of a fault isolation scheme for a class of uncertain nonlinear systems
WO2007097439A1 (en) Program execution control system, execution control method, execution control computer program
Reynders et al. Output-only structural health monitoring in changing environmental conditions by means of nonlinear system identification
Kim et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach.
Yuen et al. Real‐time system identification: an algorithm for simultaneous model class selection and parametric identification
Wang et al. Robust state estimation and fault diagnosis for uncertain hybrid systems
Zhao et al. Hybrid identification method for multi-story buildings with unknown ground motion: theory
Harvey et al. Robust methods for detecting multiple level breaks in autocorrelated time series
Rice et al. Automation reliance under time pressure.
WO2008004498A1 (en) Security risk management system, device, method, and program
Jones et al. A System‐Aware Cyber Security architecture
Wang et al. Structural damage detection using autoregressive-model-incorporating multivariate exponentially weighted moving average control chart
US20110126285A1 (en) Internet site security system and method thereto
EP1806674A3 (en) Method and apparatus for protection domain based security
Asadzadeh et al. Improving the product reliability in multistage manufacturing and service operations
Kuhnel et al. Compatibility and reuse in component-based systems via type and unit inference
Follen et al. Statistical bridge signatures
WO2009054478A1 (en) Electronic device, electronic device control method, and storage medium containing electronic device control program
Junior et al. ARX modeling approach to leak detection and diagnosis
WO2008044391A1 (en) Testing device, testing method, and manufacturing method
US7305317B2 (en) Joint approach of out-of-range detection and fault detection for power plant monitoring
Li et al. Degradation-path model for wood pole asset management
Kriaa et al. Safety and security interactions modeling using the BDMP formalism: case study of a pipeline

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07726214

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct app. not ent. europ. phase

Ref document number: 07726214

Country of ref document: EP

Kind code of ref document: A2