Meta-instrumentation for security analysis
First Claim
1. A method for testing and analyzing a security vulnerability of a multi-device network system to protocol abuse of a network communications protocol, the method implemented by a security analyzer device, comprising:
- establishing a first communication link between a member network device-under-analysis (DUA) of the multi-device network system and the security analyzer device;
establishing a second communication link between a member network device-under-observation (DUO) of the multi-device network system and the security analyzer device, the DUA and the DUO being distinct member devices of the multi-device network system;
attacking the DUA multiple times, the attacks comprising sending to the DUA through the first communication link test messages that are invalid with respect to the network communication protocol;
during and after attacking the DUA, monitoring, with the security analyzer, outputs from the DUO received over the second communication link;
determining, based on the outputs received from the DUO, whether the multi-device network system includes a security vulnerability;
responsive to a determination that the multi-device network system includes a security vulnerability, based on the outputs received from the DUO, identifying which attack causes the security vulnerability.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for analyzing and/or testing member devices in a multi-device system. The multi-device system includes a device-under-analysis (DUA) and a device-under-observation (DUO). An analyzer that is external to the multi-device system generates and sends test messages to the DUA. The analyzer monitors the health of the multi-device system through the DUO and detects a system-wide impact of the DUA caused by the test messages. The analyzer analyzes the DUA based on the test messages and the system-wide impact.
-
Citations
20 Claims
-
1. A method for testing and analyzing a security vulnerability of a multi-device network system to protocol abuse of a network communications protocol, the method implemented by a security analyzer device, comprising:
-
establishing a first communication link between a member network device-under-analysis (DUA) of the multi-device network system and the security analyzer device; establishing a second communication link between a member network device-under-observation (DUO) of the multi-device network system and the security analyzer device, the DUA and the DUO being distinct member devices of the multi-device network system; attacking the DUA multiple times, the attacks comprising sending to the DUA through the first communication link test messages that are invalid with respect to the network communication protocol; during and after attacking the DUA, monitoring, with the security analyzer, outputs from the DUO received over the second communication link; determining, based on the outputs received from the DUO, whether the multi-device network system includes a security vulnerability; responsive to a determination that the multi-device network system includes a security vulnerability, based on the outputs received from the DUO, identifying which attack causes the security vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for testing and analyzing a security vulnerability of a multi-device network system to protocol abuse of a network communications protocol, the method implemented by a security analyzer device, the computer program product comprising a computer-readable medium containing computer program code for performing a method comprising:
- establishing a first communication link between a member network device-under-analysis (DUA) of the multi-device network system and the security analyzer device;
establishing a second communication link between a member network device-under-observation (DUO) of the multi-device network system and the security analyzer device, the DUA and the DUO being distinct member devices of the multi-device network system; attacking the DUA multiple times, the attacks comprising sending to the DUA through the first communication link test messages that are invalid with respect to the network communication protocol; during and after attacking the DUA, monitoring, with the security analyzer, outputs from the DUO received over the second communication link; determining, based on the outputs received from the DUO, whether the multi-device network system includes a security vulnerability; responsive to a determination that the multi-device network system includes a security vulnerability, based on the outputs received from the DUO, identifying which attack causes the security vulnerability. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
- establishing a first communication link between a member network device-under-analysis (DUA) of the multi-device network system and the security analyzer device;
-
19. A security analyzer device for testing and analyzing a security vulnerability of a multi-device network system to protocol abuse of a network communications protocol, comprising:
-
a computer processor configured to execute computer program instructions; and a computer-readable storage medium having executable computer program instructions tangibly embodied thereon, the executable computer program configured to cause the computer processor to perform the steps of; establishing a first communication link between the DUA and an analyzer, wherein the analyzer is external to the DUA; establishing a second communication link between a device-under-observation (DUO) and the analyzer, the DUA and the DUO being distinct member devices of a multi-device system; transmitting to the DUA via the first communication link a test case including a message which is malformed or invalid with respect to the network communications protocol; monitoring via the second communication link a system-wide impact of the DUA in the multi-device system caused by the test case; and analyzing whether the DUA has a security vulnerability based on the test case and the system-wide impact.
-
-
20. A security analyzer device for testing and analyzing a security vulnerability of a multi-device network system to protocol abuse of a network communications protocol, comprising:
-
a computer processor configured to execute computer program instructions; and a computer-readable storage medium having executable computer program instructions tangibly embodied thereon, the executable computer program configured to cause the computer processor to perform the steps of; establishing a first communication link between the DUA and an analyzer, wherein the analyzer is external to the DUA; establishing a second communication link between a device-under-observation (DUO) and the analyzer, the DUA and the DUO being distinct member devices of a multi-device system; transmitting to the DUA via the first communication link a test case; monitoring via the second communication link a system-wide impact of the DUA in the multi-device system caused by the test case; and analyzing the DUA based on the test case and the system-wide impact, wherein the security analyzer device is not a member device of the multi-device network system, and wherein determining whether the multi-device network system includes a security vulnerability comprises (1) determining whether test case causes a system-wide impact through the DUA in the multi-device network system and (2) determining whether the system-wide impact comprises a security vulnerability.
-
Specification