Security Evaluation of a PC Network based on Intrusion Experiments

作者: Tomas Olovsson , Ulf Gustafson , Erland Jonsson

DOI:

关键词:

摘要: This paper presents an intrusion experiment in which the target system was a Personal Computer network connected to Novell NetWare 3.12 server. Undergraduate students with little security expertise and hardly any knowledge of served as attackers were given task performing many intrusions possible. The objectives twofold: first, learn more about how gather process data from experiments form methodology applicable generic class computer systems; and, second, find out whether it is actually possible create secure based on insecure PC workstations. deals mainly latter objective, investigates what extent unevenly distributed features, such “secure” file server untrusted clients, affect overall security. Furthermore, experiments, opposed real life situations, collect information attacking carried out. Before experiment, we anticipated that would Trojan Horses clients spoof other users during login process, but did not expect them serious vulnerabilities concept they did. shows have ample possibilities, can be compensated by features elsewhere system. has undoubtedly spent effort securing its assets than contains summary problems found, evident several new mechanisms must added before regarded secure.

参考文章(7)
Ulf Gustafson, Erland Jonsson, Tomas Olovsson, On the modelling of preventive security based on a PC network intrusion experiment australasian conference on information security and privacy. ,vol. 1172, pp. 242- 252 ,(1996) , 10.1007/BFB0023303
Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst, Bev Littlewood, Towards operational measures of computer security: Experimentation and modelling Predictably Secure Computing Systems. pp. 555- 569 ,(1995) , 10.1007/978-3-642-79789-7_31
S. Brocklehurst, B. Littlewood, T. Olovsson, E. Jonsson, On measurement of operational security IEEE Aerospace and Electronic Systems Magazine. ,vol. 9, pp. 7- 16 ,(1994) , 10.1109/62.318876
C. Richard Attanasio, Peter W. Markstein, Ray J. Phillips, None, Penetrating an operating system: a study of VM/370 integrity IBM Systems Journal. ,vol. 15, pp. 102- 116 ,(1976) , 10.1147/SJ.151.0102
Mark Lomas, Bruce Christianson, Remote booting in a hostile world: to whom am I speaking? [Computer security] IEEE Computer. ,vol. 28, pp. 50- 54 ,(1995) , 10.1109/2.362630
E. Jonsson, T. Olovsson, An empirical model of the security intrusion process Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96. pp. 176- 186 ,(1996) , 10.1109/CMPASS.1996.507886
Bev Littlewood, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, Dieter Gollmann, Towards Operational Measures of Computer Security Journal of Computer Security. ,vol. 2, pp. 211- 229 ,(1993) , 10.3233/JCS-1993-22-308