Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis

Kaarina Karppinen

Research output: Book/ReportBook (author)

Abstract

Practical evidence of the actual security performance of network systems is needed in order to be able to manage them in an adequate way. This study investigates whether the attack tree approach can be used for identification of the appropriate data to be measured in a mobile ad hoc network environment, and whether divergent results of attack tree analysis are obtained with different types of network protocols. The study focuses on the data transmitted in the network in connection with attacks against the Ad hoc On-demand Distance Vector protocol (AODV) and Mobile Internet Protocol version 6 (MIPv6). The network type and the protocols used in this study were chosen because of their novelty and their potential importance in future communication scenarios. Based on the results of the study, the attack tree approach is a helpful systematic method for exploring vulnerabilities. However, it is not suitable for a very detailed analysis of the attacks in the area of network protocols when applied manually. This is due to the complexity and diversity of information networks, which causes attack trees to inevitably grow uncontrollably large. Furthermore, this study shows that the results obtained by applying attack tree analyses differ depending on the protocol.
Original languageEnglish
Place of PublicationEspoo
PublisherVTT Technical Research Centre of Finland
Number of pages70
ISBN (Electronic)951-38-6672-6
ISBN (Print)951-38-6671-8
Publication statusPublished - 2005
MoE publication typeC1 Separate scientific books

Publication series

SeriesVTT Publications
Number580
ISSN1235-0621

Fingerprint

Mobile ad hoc networks
Network protocols
Internet protocols
Communication

Keywords

  • security measurement
  • attack trees
  • mobile ad hoc networks
  • network protocols
  • network security
  • mobile internet protocol
  • data transfer
  • vulnerability
  • evaluation

Cite this

Karppinen, K. (2005). Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis. Espoo: VTT Technical Research Centre of Finland. VTT Publications, No. 580
Karppinen, Kaarina. / Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment : Master's thesis. Espoo : VTT Technical Research Centre of Finland, 2005. 70 p. (VTT Publications; No. 580).
@book{ef0f8968a4404cf2ab1b66d34dd9ddd9,
title = "Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis",
abstract = "Practical evidence of the actual security performance of network systems is needed in order to be able to manage them in an adequate way. This study investigates whether the attack tree approach can be used for identification of the appropriate data to be measured in a mobile ad hoc network environment, and whether divergent results of attack tree analysis are obtained with different types of network protocols. The study focuses on the data transmitted in the network in connection with attacks against the Ad hoc On-demand Distance Vector protocol (AODV) and Mobile Internet Protocol version 6 (MIPv6). The network type and the protocols used in this study were chosen because of their novelty and their potential importance in future communication scenarios. Based on the results of the study, the attack tree approach is a helpful systematic method for exploring vulnerabilities. However, it is not suitable for a very detailed analysis of the attacks in the area of network protocols when applied manually. This is due to the complexity and diversity of information networks, which causes attack trees to inevitably grow uncontrollably large. Furthermore, this study shows that the results obtained by applying attack tree analyses differ depending on the protocol.",
keywords = "security measurement, attack trees, mobile ad hoc networks, network protocols, network security, mobile internet protocol, data transfer, vulnerability, evaluation",
author = "Kaarina Karppinen",
note = "Project code: E5SU00573",
year = "2005",
language = "English",
isbn = "951-38-6671-8",
series = "VTT Publications",
publisher = "VTT Technical Research Centre of Finland",
number = "580",
address = "Finland",

}

Karppinen, K 2005, Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis. VTT Publications, no. 580, VTT Technical Research Centre of Finland, Espoo.

Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment : Master's thesis. / Karppinen, Kaarina.

Espoo : VTT Technical Research Centre of Finland, 2005. 70 p. (VTT Publications; No. 580).

Research output: Book/ReportBook (author)

TY - BOOK

T1 - Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment

T2 - Master's thesis

AU - Karppinen, Kaarina

N1 - Project code: E5SU00573

PY - 2005

Y1 - 2005

N2 - Practical evidence of the actual security performance of network systems is needed in order to be able to manage them in an adequate way. This study investigates whether the attack tree approach can be used for identification of the appropriate data to be measured in a mobile ad hoc network environment, and whether divergent results of attack tree analysis are obtained with different types of network protocols. The study focuses on the data transmitted in the network in connection with attacks against the Ad hoc On-demand Distance Vector protocol (AODV) and Mobile Internet Protocol version 6 (MIPv6). The network type and the protocols used in this study were chosen because of their novelty and their potential importance in future communication scenarios. Based on the results of the study, the attack tree approach is a helpful systematic method for exploring vulnerabilities. However, it is not suitable for a very detailed analysis of the attacks in the area of network protocols when applied manually. This is due to the complexity and diversity of information networks, which causes attack trees to inevitably grow uncontrollably large. Furthermore, this study shows that the results obtained by applying attack tree analyses differ depending on the protocol.

AB - Practical evidence of the actual security performance of network systems is needed in order to be able to manage them in an adequate way. This study investigates whether the attack tree approach can be used for identification of the appropriate data to be measured in a mobile ad hoc network environment, and whether divergent results of attack tree analysis are obtained with different types of network protocols. The study focuses on the data transmitted in the network in connection with attacks against the Ad hoc On-demand Distance Vector protocol (AODV) and Mobile Internet Protocol version 6 (MIPv6). The network type and the protocols used in this study were chosen because of their novelty and their potential importance in future communication scenarios. Based on the results of the study, the attack tree approach is a helpful systematic method for exploring vulnerabilities. However, it is not suitable for a very detailed analysis of the attacks in the area of network protocols when applied manually. This is due to the complexity and diversity of information networks, which causes attack trees to inevitably grow uncontrollably large. Furthermore, this study shows that the results obtained by applying attack tree analyses differ depending on the protocol.

KW - security measurement

KW - attack trees

KW - mobile ad hoc networks

KW - network protocols

KW - network security

KW - mobile internet protocol

KW - data transfer

KW - vulnerability

KW - evaluation

M3 - Book (author)

SN - 951-38-6671-8

T3 - VTT Publications

BT - Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment

PB - VTT Technical Research Centre of Finland

CY - Espoo

ER -

Karppinen K. Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis. Espoo: VTT Technical Research Centre of Finland, 2005. 70 p. (VTT Publications; No. 580).