Skip to:Content
|
Bottom
Cover image for Risk propagation assessment for network security : application to airport communication network design
Title:
Risk propagation assessment for network security : application to airport communication network design
Personal Author:
Series:
Focus series in networks and telecommunications
Publication Information:
Hoboken, NJ : ISTE Ltd/John Wiley and Sons Inc, 2013
Physical Description:
xi, 119 p. : ill. ; 24 cm.
ISBN:
9781848214545
Abstract:
The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010311961 TK5105.59 B46 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool. This original approach aims to help network designers and security administrators to design and build more robust and secure network topologies. As an implementation case study, the authors consider an aeronautical network based on AeroMACS (Aeronautical Mobile Airport Communications System) technology. AeroMACS has been identified as the wireless access network for airport surface communications that will soon be deployed in European and American airports mainly for communications between aircraft and airlines. It is based on the IEEE 802.16-2009 standard, also known as WiMAX.
The book begins with an introduction to the information system security risk management process, before moving on to present the different risk management methodologies that can be currently used (quantitative and qualitative). In the third part of the book, the authors' original quantitative network risk assessment model based on risk propagation is introduced. Finally, a network case study of the future airport AeroMACS system is presented. This example illustrates how the authors' quantitative risk assessment proposal can provide help to network security designers for the decision-making process and how the security of the entire network may thus be improved.

Contents

Part 1. Network Security Risk Assessment
1. Introduction to Information System Security Risk Management Process.
2. System Security Risk Management Background.
3. A Quantitative Network Risk Management Methodology Based on Risk Propagation.
Part 2. Application to Airport Communication Network Design
4. The AeroMACS Communication System in the SESAR Project.
5. Aeronautical Network Case Study.


Author Notes

Mohamed Slim Ben Mahmoud is a research engineer for the research group ResCO at the TELECOM laboratory of ENAC, the French national institution for civil aviation.
Nicolas Larrieu is a teacher and research at the research group ResCO at the TELECOM laboratory of ENAC.
Alain Pirovano is a teacher and researcher and head of the research group ResCo at the TELECOM laboratory of ENAC.


Table of Contents

List of Figuresp. ix
List of Tablesp. xiii
Introductionp. xv
Part 1 Network Security Risk Assessmentp. 1
Chapter 1 Introduction to Information System Security Risk Management Processp. 3
1.1 On the importance of network security for network designersp. 5
1.2 On the impact of risk assessment in the decision-making process for network security designersp. 6
1.3 Quantitative versus qualitative risk assessment approachesp. 7
1.4 Network security risk propagation conceptp. 10
1.4.1 Impact of node correlationp. 10
1.4.2 Network security risk transitivityp. 11
1.4.3 Network security risk propagation illustrative casep. 12
Chapter 2 Security Risk Management Backgroundp. 17
2.1 Qualitative security risk management methodsp. 18
2.1.1 CRAMMp. 18
2.1.2 OCTAVEp. 18
2.1.3 EBIOSp. 19
2.1.4 MEHARIp. 19
2.1.5 CORASp. 20
2.1.6 Discussionp. 20
2.2 Quantitative security risk assessment approachesp. 20
2.3 Toward a quantitative propagation-based risk assessment methodologyp. 25
Chapter 3 A Quantitative Network Risk Assessment Methodology Based on Risk Propagationp. 27
3.1 Quantifying methodology parametersp. 27
3.1.1 Network risk decompositionp. 28
3.1.2 Node valuep. 29
3.1.3 Enhanced node valuep. 30
3.1.4 Impact of threatsp. 30
3.1.5 Likelihood of threatsp. 32
3.2 Network security risk assessment processp. 36
3.3 Conclusionp. 39
Part 2 Application to Airport Communication Network Designp. 41
Chapter 4 The AeroMACS Communication System in the Sesar Projectp. 43
4.1 Overview of the European SESAR projectp. 43
4.2 Overview of aeronautical communications operating concept and requirementsp. 44
4.3 Introduction to the AeroMACS communication systemp. 47
4.3.1 AeroMACS protocol stackp. 48
4.3.2 AeroMACS reference network architecturep. 50
4.3.3 AeroMACS security considerationsp. 52
4.3.3.1 Analysis of AeroMACS security weaknessesp. 53
4.3.4 AeroMACS reference network topologyp. 55
4.3.4.1 Isolated AeroMACS network architecturep. 55
4.3.4.2 End-to-end AeroMACS network architecturep. 56
Chapter 5 Aeronautical Network Case Studyp. 59
5.1 Experimental parametersp. 59
5.1.1 Testbed infrastructurep. 59
5.1.2 Aeronautical node values instantiationp. 61
5.1.3 Aeronautical services instantiationp. 62
5.1.4 Isolated vs. end-to-end emulation scenariosp. 63
5.2 AeroMACS case study: experimental resultsp. 63
5.2.1 Main inputs for emulation scenariosp. 63
5.2.2 Isolated AeroMACS scenario: preliminary resultsp. 63
5.2.2.1 Individual risksp. 63
5.2.2.2 Propagated risksp. 68
5.2.2.3 Node and network risksp. 70
5.2.3 Isolated AeroMACS scenario: EAP vs. RSA sub-scenariop. 72
5.2.4 Preliminary AeroMACS security enhancement guidancep. 76
5.2.5 AeroMACS implementation improvements: isolated scenario without operational server vulnerabilitiesp. 77
5.2.5.1 Experimental inputsp. 78
5.2.5.2 Network topologyp. 78
5.2.5.3 Vulnerability statisticsp. 79
5.2.5.4 Individual risk resultsp. 81
5.2.5.5 Propagated risk resultsp. 81
5.2.5.6 Network risk resultsp. 83
5.2.6 AeroMACS topological improvements: isolated scenario with two ASN gatewaysp. 84
5.2.6.1 Experimental inputsp. 84
5.2.6.2 Network topologyp. 85
5.2.6.3 Vulnerability statisticsp. 85
5.2.6.4 Individual risk resultsp. 85
5.2.6.5 Propagation risk resultsp. 87
5.2.6.6 Network risk resultsp. 89
5.2.7 Scenario with end-to-end AeroMACS topologyp. 91
5.2.7.1 Experimental inputsp. 91
5.2.7.2 Network topologyp. 92
5.2.7.3 Vulnerability statisticsp. 93
5.2.7.4 Individual risk resultsp. 95
5.2.7.5 Propagated risk resultsp. 97
5.2.7.6 Network risk resultsp. 97
5.3 Improving AeroMACS network securityp. 99
5.3.1 DHCP securityp. 101
5.3.2 Mobile IP securityp. 103
Conclusionp. 109
Bibliographyp. 111
Indexp. 117
Go to:Top of Page