Abstract
Gaining a complete understanding of the active services and open communication paths present in recently created networked systems consisting of various servers and network devices is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, we propose an automated approach to identifying and understanding the active services and the permitted communications on all servers and network devices. We then show how hand-designed networked systems containing such devices are prone to contain numerous unnecessary active services and communication paths, which exposes them to malicious actions such a service denial, information theft, and/or cyber espionage. An evaluation result shows the effectiveness of our proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Breitbart, Y., Garofalakis, M., et al.: Topology discovery in heterogeneous IP networks: the NetInventory system. IEEE ACM Trans. Netw. 12(3), 401–414 (2004)
Black, R., Donnelly, A., et al.: Ethernet topology discovery without network assistance. In: ICNP, Berlin, pp. 328–339 (2004)
Chen, X., Zhang, M., et al.: Automating network application dependency discovery: experiences, limitations, and new solutions. In: OSDI, San Diego, pp. 117–130 (2008)
Kanaoka, A., Katoh, M., et al.: Extraction of parameters from well managed networked system in access control. In: ICIMP, Venice/Mestre, pp. 56–61 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Higurashi, I., Kanaoka, A., Kato, M., Okamoto, E. (2013). Discovery of Unexpected Services and Communication Paths in Networked Systems. In: Al-Shaer, E., Ou, X., Xie, G. (eds) Automated Security Management. Springer, Cham. https://doi.org/10.1007/978-3-319-01433-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-01433-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01432-6
Online ISBN: 978-3-319-01433-3
eBook Packages: Computer ScienceComputer Science (R0)