SwePub
Sök i LIBRIS databas

  Utökad sökning

id:"swepub:oai:research.chalmers.se:e3bf663f-96b4-4349-a9cd-ffd1e7b9dd5a"
 

Sökning: id:"swepub:oai:research.chalmers.se:e3bf663f-96b4-4349-a9cd-ffd1e7b9dd5a" > Security Evaluation...

Security Evaluation of a PC Network based on Intrusion Experiments

Gustafson, Ulf, 1967 (författare)
Chalmers tekniska högskola,Chalmers University of Technology
Jonsson, Erland, 1946 (författare)
Chalmers tekniska högskola,Chalmers University of Technology
Olovsson, Tomas, 1959 (författare)
Chalmers tekniska högskola,Chalmers University of Technology
 (creator_code:org_t)
1995
1995
Engelska.
Ingår i: Proc. 14th Int'l Congress on Computer and Communications Security, SECURICOM '96, Paris, France. ; , s. 187-203
  • Konferensbidrag (refereegranskat)
Abstract Ämnesord
Stäng  
  • This paper presents an intrusion experiment in which the target system was a Novell NetWare 3.12 server to which Personal Computer clients were connected. Undergraduate students with little security expertise and hardly any knowledge of the system served as attackers and were given the task of performing as many intrusions as possible. The objectives of the experiment were twofold: first, to learn more about how to gather and process data from intrusion experiments and to form a methodology applicable to a generic class of computer systems; and, second, to find out whether it is actually possible to create a secure system based on insecure PC workstations. This paper deals mainly with the latter objective, and investigates how and to what extent unevenly distributed security features, such as a “secure” file server with untrusted clients, affect overall system security. Furthermore, in experiments, as opposed to real life situations, it is possible to collect information about how the attacking process is carried out.Before the experiment, we anticipated that the attackers would create Trojan Horses on the clients to spoof other users during the login process, but we did not expect them to find as many serious vulnerabilities in the concept as they did. The experiment shows that untrusted PC clients have ample intrusion possibilities, and that the vulnerabilities can not be compensated by security features elsewhere in the system. Novell has undoubtedly spent more effort in securing the file server and its assets than in securing the clients in the system. This paper contains a summary of the security problems the attackers found, from which it is evident that several new security mechanisms must be added before a NetWare 3.12 system can be regarded as secure.

Ämnesord

NATURVETENSKAP  -- Data- och informationsvetenskap -- Systemvetenskap, informationssystem och informatik (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Information Systems (hsv//eng)

Nyckelord

Experimentation
Intrusion
Dependability.
Vulnerability
Tiger Team

Publikations- och innehållstyp

kon (ämneskategori)
ref (ämneskategori)

Till lärosätets databas

Hitta mer i SwePub

Av författaren/redakt...
Gustafson, Ulf, ...
Jonsson, Erland, ...
Olovsson, Tomas, ...
Om ämnet
NATURVETENSKAP
NATURVETENSKAP
och Data och informa ...
och Systemvetenskap ...
Artiklar i publikationen
Av lärosätet
Chalmers tekniska högskola

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy