Ferret: a host vulnerability checking tool

Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classified based on their location as application vulnerabilities, network vulnerabilities, or host vulnerabilities. We describe Ferret, a new software tool for checking host vulnerabilities. Ferret helps system administrators by quickly finding vulnerabilities that are present on a host. It is designed and implemented in a modular way: a different plug-in module is used for each vulnerability checked, and each possible output format is specified by a plug-in module. As a result, Ferret is extensible, and can easily be kept up-to-date through addition of checks for new vulnerabilities as they are discovered; the modular approach also makes it easy to provide specific configurations of Ferret tailored to specific operating systems or use environments. Ferret is a freely available open-source software implemented in Perl.

[1]  William H. Sanders,et al.  Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[4]  Kishor S. Trivedi,et al.  Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[5]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[6]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[7]  FrazerKen Building secure software , 2002 .

[8]  J. Lowry An initial foray into understanding adversary planning and courses of action , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[9]  Jeannette M. Wing,et al.  Survivability analysis of networked systems , 2001, ICSE 2001.

[10]  Jeannette M. Wing Survivability analysis of networked systems , 2000, FORTE.

[11]  Eugene H. Spafford,et al.  The COPS Security Checker System , 1990, USENIX Summer.

[12]  William H. Sanders,et al.  Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures , 2003, LADC.

[13]  William H. Sanders,et al.  Probabilistic Validation of Intrusion Tolerance 1 , 2002 .

[14]  Marc Dacier,et al.  Privilege Graph: an Extension to the Typed Access Matrix Model , 1994, ESORICS.

[15]  Marc Dacier,et al.  Quantitative Assessment of Operational Security: Models and Tools * , 1996 .

[16]  Birgit Pfitzmann,et al.  MAFTIA: Reference Model and Use Cases , 2000 .