体育赛事投注记录

advertisement

Remote Automated Vulnerability Assessment and Mitigation in an Organization LAN

  • Nishant SharmaEmail author
  • H. Parveen SultanaEmail author
  • Asif Sayyad
  • Rahul Singh
  • Shriniwas Patil
Conference paper
  • 21 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 127)

Abstract

the process of making the network of an organization (an enterprise or an institution) fool-proof and secure holds great importance in today’s interconnected world. any possible backdoor entry into any of the workstations in a large interconnected organizational network has the potential of a severe security breach that could prove fatal to the integrity of the organization. strong and automated solutions are required that provide as a complete package, a sound vulnerability assessment, and satisfactory mitigation should a compromise in any workstation is detected. this paper explores the need and creation of such a complete security package.

Keywords

Network vulnerability Vulnerability assessment Cyber attacks Vulnerability mitigation 

References

  1. 1.
    The Benefits of a Vulnerability Assessment. . Last accessed 6 Dec 2019
  2. 2.
    Wang Y, Yang J (2017) Ethical hacking and network defense: choose your best network vulnerability scanning tool. In: International conference on advanced information networking and application workshops (WAINA), vol 31. IEEE, pp 110–113
  3. 3.
    Guo F, Yu Y, Chiueh TC (2005) Automated and safe vulnerability assessment. In: Annual computer security applications conference (ACSAS05), vol 21. IEEE, p 10
  4. 4.
    Liu C, Richardson DJ (2000) Ethical hacking and network defense: automated security checking and patching using Testtalk. In: International conference on automated software engineering, Proceedings ASE, vol 15. IEEE, pp 261–264
  5. 5.
    Lukanta R, Asnar Y, Kistijantoro AI (2014) A vulnerability tool for session management vulnerabilities. In: International conference on data and software engineering (ICODSE). IEEE, pp 1–6
  6. 6.
    Introduction to the Nikto Web Application Vulnerability Scanner. . Last accessed 6 Dec 2019
  7. 7.
    Im SY, Shin SH, Roh BH (2016) Performance evaluation of network scanning tool with operation of firewall. In: International conference on ubiquitous and future networks (ICUFN), vol 8. IEEE, pp 876–881
  8. 8.
    Mukherjee S, Sen P, Bora S, Pradhan C (2015) SQL injection: a sample review. In: International conference on computing communication and networking technologies (ICCCNT), vol 6. IEEE, pp 1–7
  9. 9.
    Almashhadani AO, Kaiiali M, Sezer S, OKane P (2019) A multi-classifier network-based crypto ransomware detection system: a case study of Locky ransomware. In: IEEE Access, vol 7. IEEE, pp 47053–47067
  10. 10.
    How Hackable is your password? . Last accessed 6 Dec 2019
  11. 11.
    Welcome to Paramiko. . Last accessed 6 Dec 2019
  12. 12.
    Advanced Encryption Standard. . Last accessed 6 Dec 2019
  13. 13.
    File Encryption And Decryption Using Python. . Last accessed 6 Dec 2019
  14. 14.
    VulnOS:2. . Last accessed 6 Dec 2019
  15. 15.
    VulnOS:2 Walkthrough. . Last accessed 6 Dec 2019
  16. 16.
    nmap(1)–Linux man page. . Last accessed 6 Dec 2019
  17. 17.
    Support for Windows 7 ends in January 2020. . Last accessed 6 Dec 2019
  18. 18.
    Windows by the numbers: Windows 10 hits late wall, stalls. . Last accessed 6 Dec 2019
  19. 19.
    OpenVAS—Open Vulnerability Assessment Scanner. . Last accessed 6 Dec 2019
  20. 20.
    NetUserChangePassword function. . Last accessed 6 Dec 2019

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.School of Computer Science and EngineeringVellore Institute of TechnologyVelloreIndia

Personalised recommendations