(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
Chapter 1 General introduction
1.1 The context
1.2 The problem
1.3 Organization of the document
1.3.1 Part I: State of the art
1.3.2 Part II: Contributions
1.3.3 Part III: Implementation
Part I Autonomic environments and vulnerability management
Chapter 2 Network management and autonomic computing
2.1 Introduction
2.2 Large-scale network management
2.2.1 Computer networks and the Internet
2.2.2 Technological evolution
2.2.3 End-users behavior
2.3 Autonomic computing overview
2.3.1 Key concepts of autonomics
2.3.2 Behavioral and architectural models
2.4 Security issues in autonomics
2.4.1 Vulnerability management in autonomic environments
2.5 Synthesis
Chapter 3 Vulnerability management
3.1 Introduction
3.2 The vulnerability management process
3.2.1 A brief history of vulnerability management
3.2.2 On the organization of vulnerability management activities
3.3 Discovering Vulnerabilities
3.3.1 Exploiting testing methods
3.3.2 Using network forensics
3.3.3 Taking advantage of experience
3.4 Describing Vulnerabilities
3.5 Detecting vulnerabilities
3.5.1 Analyzing device vulnerabilities
3.5.2 Analyzing network vulnerabilities
3.5.3 Correlating vulnerabilities with threats and attack graphs
3.6 Remediating vulnerabilities
3.6.1 Change management
3.6.2 Risk and impact assessment
3.7 Research challenges
3.8 Synthesis
Part II An autonomic platform for managing configuration vulnerabilities
Chapter 4 Autonomic vulnerability awareness
4.1 Introduction
4.2 Integration of OVAL vulnerability descriptions
4.3 OVAL-aware self-configuration
4.3.1 Overall architecture
4.3.2 OVAL to Cfengine translation formalization
4.4 Experimental results
4.4.1 IOS coverage and execution time
4.4.2 Size of generated Cfengine policies for Cisco IOS
4.5 Synthesis
Chapter 5 Extension to distributed vulnerabilities
5.1 Introduction
5.2 Specification of distributed vulnerabilities
5.2.1 Motivation, definition, and mathematical modeling
5.2.2 DOVAL, a distributed vulnerability description language
5.3 Assessing distributed vulnerabilities
5.3.1 Extended architecture overview
5.3.2 Assessment strategies
5.4 Performance evaluation
5.5 Synthesis
Chapter 6 Support for past hidden vulnerable states
6.1 Introduction
6.2 Modeling past unknown security exposures
6.2.1 Understanding past unknown security exposures
6.2.2 Specifying past unknown security exposures
6.3 Detecting past hidden vulnerable states
6.3.1 Extended architecture overview
6.3.2 Assessment strategy
6.4 Experimental results
6.5 Synthesis
Chapter 7 Mobile security assessment
7.1 Introduction
7.2 Background and motivations
7.3 Vulnerability self-assessment
7.3.1 Self-assessment process model
7.3.2 Assessing Android vulnerabilities
7.3.3 Experimental results
7.4 Probabilistic vulnerability assessment
7.4.1 Probabilistic assessment model
7.4.2 Ovaldroid, a probabilistic vulnerability assessment extension
7.4.3 Performance evaluation
7.5 Synthesis
Chapter 8 Remediation of configuration vulnerabilities
8.1 Introduction
8.2 Background and motivations
8.3 Remediating device-based vulnerabilities
8.3.1 Vulnerability remediation modeling
8.3.2 The X2CCDF specification language
8.3.3 Extended framework for remediating device-based vulnerabilities
8.3.4 Performance evaluation
8.4 Towards the remediation of distributed vulnerabilities
8.4.1 Modeling vulnerability treatments
8.4.2 DXCCDF, a distributed vulnerability remediation language
8.4.3 A strategy for collaboratively treating distributed vulnerabilities
8.4.4 Performance evaluation
8.5 Synthesis
Part III Implementation
Chapter 9 Development of autonomic vulnerability assessment solutions
9.1 Introduction
9.2 Autonomic vulnerability assessment with Ovalyzer
9.2.1 Implementation prototype
9.2.2 OVAL to Cfengine generation example with Ovalyzer
9.3 Extension to past hidden vulnerable states
9.4 Mobile security assessment with Ovaldroid
9.4.1 Implementation prototype
9.4.2 A probabilistic extension
9.5 Synthesis
Conclusion
Chapter 10 General conclusion
10.1 Contributions summary
10.1.1 Autonomic vulnerability management
10.1.2 Implementation prototypes
10.2 Perspectives
10.2.1 Proactive autonomic defense by anticipating future vulnerable states
10.2.2 Unified autonomic management platform
10.2.3 Autonomic security for current and emerging technologies
10.3 List of publications



