Performance of automated network vulnerability scanning at remediating security issues

被引:15
|
作者
Holm, Hannes [1 ]
机构
[1] Royal Inst Technol, Ind Informat & Control Syst, SE-10044 Stockholm, Sweden
关键词
Network security; Security tools; Vulnerabilities; Vulnerability remediation; Vulnerability detection;
D O I
10.1016/j.cose.2011.12.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates how large portion of an enterprises network security holes that would be remediated if one would follow the remediation guidelines provided by seven automated network vulnerability scanners. Remediation performance was assessed for both authenticated and unauthenticated scans. The overall findings suggest that a vulnerability scanner is a usable security assessment tool, given that credentials are available for the systems in the network. However, there are issues with the method: manual effort is needed to reach complete accuracy and the remediation guidelines are oftentimes very cumbersome to study. Results also show that a scanner more accurate in terms of remediating vulnerabilities generally also is better at detecting vulnerabilities, but is in turn also more prone to false alarms. This is independent of whether the scanner is provided system credentials or not. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 50 条
  • [31] Formal validation of automated policy refinement in the management of network security systems
    de Albuquerque, Joao Porto
    Krumm, Heiko
    de Geus, Paulo Licio
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (02) : 99 - 125
  • [32] Formal validation of automated policy refinement in the management of network security systems
    João Porto de Albuquerque
    Heiko Krumm
    Paulo Lício de Geus
    International Journal of Information Security, 2010, 9 : 99 - 125
  • [33] Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
    Song, Xiaoqin
    PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 1023 - 1027
  • [34] Performance Evaluation of Network Scanning Tools with Operation of Firewall
    Im, Sun-young
    Shin, Seung-Hun
    Ryu, Ki Yeol
    Roh, Byeong-hee
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 876 - 881
  • [35] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated
    Yang, Jungang
    Liang, Li
    Yang, Yanfeng
    Zhu, Guangliang
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118
  • [36] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS
    Liao, Yan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
  • [37] High Performance Pattern Matching Algorithm for Network Security
    Wang, Yang
    Kobayashi, Hidetsune
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 83 - 87
  • [38] Network Security Metrics and Performance for Healthcare Systems Management
    Liu, Vicky
    Tesfamicael, Aklilu Daniel
    Caelli, William
    Sahama, Tony
    2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 189 - 194
  • [39] Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures
    Jo, Jeong Hoon
    Sharma, Pradip Kumar
    Sicato, Jose Costa Sapalo
    Park, Jong Hyuk
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (04): : 765 - 784
  • [40] Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues
    McMahon, Christopher
    Zhang, Xiaowen
    2018 IEEE 39TH SARNOFF SYMPOSIUM, 2018,