MIT Working On Network Vulnerability Analysis 25
An anonymous reader writes "Researchers at MIT have created a method for analyzing networks to detect exploitable vulnerabilities using attack graph analysis which can be done in near real time. The new Lincoln Labs tool will allow admins of large networks to detect their most vulnerable areas and also model zero day attacks. 'NetSPA (for Network Security Planning Architecture) uses information about networks and the individual machines and programs running on them to create a graph that shows how hackers could infiltrate them. System administrators can examine visualizations of the graph themselves to decide what action to take, but NetSPA also analyzes the graph and offers recommendations about how to quickly fix the most important weaknesses. NetSPA relies on vulnerability scanners to identify known weaknesses in network-accessible programs that might allow an unauthorized person access to a machine. But simply being aware of vulnerabilities is not sufficient; NetSPA also has to analyze complex firewall and router rules to determine which vulnerabilities can actually be reached and exploited by attackers and how attackers can spread through a network by jumping from one vulnerable host to another.'"
Hacker Tool (Score:4, Interesting)
Re:Hacker Tool (Score:5, Funny)
How long before there's a hacker tool version of this to spot vulnerabilities that exist because the sys admin isn't using it to defend his network?
Done!
Next question.
Re: (Score:3, Funny)
Not long (Score:3, Informative)
Re: (Score:2)
There have been tons of projects like this in the past, and I don't think there will be any serious traction until people start releasing code.
By the way, shameless plug for my current project (as seen in my sig). It's a security visualization framework designed to make it very easy for security auditors to write data gathering modules, and visualization experts to write modules for visualizing data.
I will be giving a demo of my project at vizsec in a couple weeks (http://www.vizsec.org/workshop2008/), so
Charts (Score:4, Funny)
Re: (Score:2)
You laugh now, but most modern security analysis systems have this feature. Especially the expensive ones designed for large corporate networks.
Old news (Score:1, Funny)
MIT Professors have been giving guest lectures on this for over two years. Not news
Bragging rights? (Score:5, Insightful)
The software sound sweet. But there are a few details missing.
1. Is it available for public use?
2. When will it be available?
3. What does it cost?
4. What platform(s) does it run on?
5. Where can I get it?
Or was this just bragging rights to say, "Look! We did something really, really cool, but you can't have it."
Re:Bragging rights? (Score:5, Insightful)
Or was this just bragging rights to say, "Look! We did something really, really cool, but you can't have it."
The MIT does that a lot. And /. likes to be used as a PR agency.
Re: (Score:1)
Re: (Score:1)
Same old same old. (Score:1)