Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Technology

MIT Working On Network Vulnerability Analysis 25

An anonymous reader writes "Researchers at MIT have created a method for analyzing networks to detect exploitable vulnerabilities using attack graph analysis which can be done in near real time. The new Lincoln Labs tool will allow admins of large networks to detect their most vulnerable areas and also model zero day attacks. 'NetSPA (for Network Security Planning Architecture) uses information about networks and the individual machines and programs running on them to create a graph that shows how hackers could infiltrate them. System administrators can examine visualizations of the graph themselves to decide what action to take, but NetSPA also analyzes the graph and offers recommendations about how to quickly fix the most important weaknesses. NetSPA relies on vulnerability scanners to identify known weaknesses in network-accessible programs that might allow an unauthorized person access to a machine. But simply being aware of vulnerabilities is not sufficient; NetSPA also has to analyze complex firewall and router rules to determine which vulnerabilities can actually be reached and exploited by attackers and how attackers can spread through a network by jumping from one vulnerable host to another.'"
This discussion has been archived. No new comments can be posted.

MIT Working On Network Vulnerability Analysis

Comments Filter:
  • Hacker Tool (Score:4, Interesting)

    by Nom du Keyboard ( 633989 ) on Friday August 29, 2008 @06:10PM (#24802561)
    How long before there's a hacker tool version of this to spot vulnerabilities that exist because the sys admin isn't using it to defend his network?
    • by BitterOldGUy ( 1330491 ) on Friday August 29, 2008 @06:12PM (#24802627)

      How long before there's a hacker tool version of this to spot vulnerabilities that exist because the sys admin isn't using it to defend his network?

      Done!

      Next question.

    • Re: (Score:3, Funny)

      I nominate you for director of marketing for whatever company ends up commercializing this.
    • Not long (Score:3, Informative)

      by Crazy Taco ( 1083423 )

      How long before there's a hacker tool version of this to spot vulnerabilities that exist because the sys admin isn't using it to defend his network?

      Probably not that long. This technology isn't overly groundbreaking or original. I don't want to take anything away from those who worked on this, because I'm sure they did a great job, but they weren't the only ones who thought of this. I was working on a similar project at Iowa State three years ago. I haven't followed the project since I left the university

    • There have been tons of projects like this in the past, and I don't think there will be any serious traction until people start releasing code.

      By the way, shameless plug for my current project (as seen in my sig). It's a security visualization framework designed to make it very easy for security auditors to write data gathering modules, and visualization experts to write modules for visualizing data.

      I will be giving a demo of my project at vizsec in a couple weeks (http://www.vizsec.org/workshop2008/), so

  • Charts (Score:4, Funny)

    by nickswitzer ( 1352967 ) on Friday August 29, 2008 @06:12PM (#24802633) Homepage
    Will it also create a powerpoint presentation so they can show it off to their boss about how they probably need a raise?
    • You laugh now, but most modern security analysis systems have this feature. Especially the expensive ones designed for large corporate networks.

  • Old news (Score:1, Funny)

    by Anonymous Coward

    MIT Professors have been giving guest lectures on this for over two years. Not news

  • Bragging rights? (Score:5, Insightful)

    by knarfling ( 735361 ) on Friday August 29, 2008 @06:29PM (#24802931) Journal

    The software sound sweet. But there are a few details missing.

    1. Is it available for public use?
    2. When will it be available?
    3. What does it cost?
    4. What platform(s) does it run on?
    5. Where can I get it?

    Or was this just bragging rights to say, "Look! We did something really, really cool, but you can't have it."

  • How is this different from what is already being done with vuln scanners? How does this find 0-days? The test comes from a particular vector which finds KNOWN vulnerabilities. This will only find Access problems if the limitations of the systems is known. It does nothing to determine trust problems like spoofing, MITM attacks, and attacks from other vectors. What they needed to do is look at it in a new way like in the SCARE project (Source Code Analysis Risk Evaluation) from ISECOM which determines all in

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...