Sciweavers

Share
CIIT
2004

A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures

9 years 18 days ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on software vulnerabilities and engineering best practices related to general purpose operating systems and applications. A large number of network protocol related vulnerabilities are being repeated in network devices as well as the poor engineering design and implementation errors which make these vulnerabilities possible. This paper attempts to document and classify such vulnerabilities and the corresponding engineering(design, implementation and testing) countermeasures, with a goal of helping the engineering teams not repeat the errors that are the root causes of these vulnerabilities. We have studied about 500 protocol related vulnerabilities to develop this taxonomy. We assume that the reader has basic familiarity with software design, networking and programming languages. KEY WORDS Protocol security, Vulner...
Venkat Pothamsetty, Bora A. Akyol
Added 30 Oct 2010
Updated 30 Oct 2010
Type Conference
Year 2004
Where CIIT
Authors Venkat Pothamsetty, Bora A. Akyol
Comments (0)
books