Performance of automated network vulnerability scanning at remediating security issues

被引:15
|
作者
Holm, Hannes [1 ]
机构
[1] Royal Inst Technol, Ind Informat & Control Syst, SE-10044 Stockholm, Sweden
关键词
Network security; Security tools; Vulnerabilities; Vulnerability remediation; Vulnerability detection;
D O I
10.1016/j.cose.2011.12.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates how large portion of an enterprises network security holes that would be remediated if one would follow the remediation guidelines provided by seven automated network vulnerability scanners. Remediation performance was assessed for both authenticated and unauthenticated scans. The overall findings suggest that a vulnerability scanner is a usable security assessment tool, given that credentials are available for the systems in the network. However, there are issues with the method: manual effort is needed to reach complete accuracy and the remediation guidelines are oftentimes very cumbersome to study. Results also show that a scanner more accurate in terms of remediating vulnerabilities generally also is better at detecting vulnerabilities, but is in turn also more prone to false alarms. This is independent of whether the scanner is provided system credentials or not. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 50 条
  • [1] Towards Automated Vulnerability Scanning of Network Servers
    Schagen, Nathan
    Koning, Koen
    Bos, Herbert
    Giuffrida, Cristiano
    PROCEEDINGS OF THE 11TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2018), 2018,
  • [2] AUSERA: Automated Security Vulnerability Detection for Android Apps
    Chen, Sen
    Zhang, Yuxin
    Fan, Lingling
    Li, Jiaming
    Liu, Yang
    PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
  • [3] The Designing and Implementing of the Network Vulnerability Scanning Tool
    Zhang, Hui
    Lu, Yu
    HIGH PERFORMANCE NETWORKING, COMPUTING, AND COMMUNICATION SYSTEMS, 2011, 163 : 342 - +
  • [4] Vulnus: Visual Vulnerability Analysis for Network Security
    Angelini, Marco
    Blasilli, Graziano
    Catarci, Tiziana
    Lenti, Simone
    Santucci, Giuseppe
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2019, 25 (01) : 183 - 192
  • [5] Network Security Architecture Based on Vulnerability Evaluation
    Li, June
    Wang, Tongqing
    Zhou, Dongru
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
  • [6] Network Risk Evaluation from Security Metric of Vulnerability Detection Tools
    Hemanidhi, Aniwat
    Chimmanee, Sanon
    Sanguansat, Parinya
    TENCON 2014 - 2014 IEEE REGION 10 CONFERENCE, 2014,
  • [7] Rigorous automated network security management
    Guttman J.D.
    Herzog A.L.
    International Journal of Information Security, 2005, 4 (1-2) : 29 - 48
  • [8] A Study of Vulnerability Detection and Prevention on Computer Network Security
    Yang, Xiaohong
    Chen, Yuefeng
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2630 - +
  • [10] A Scalable, Vulnerability Modelling and Correlating Method for Network Security
    Liu, Xuejiao
    Xiao, Debao
    Ma, Nian
    Yu, Jie
    SCALABLE INFORMATION SYSTEMS, 2009, 18 : 217 - +