Analysis of Penetration Testing and Vulnerability in Computer Networks

Abid Khan, AL-FALAH UNIVERSITY ; Ruchi Parashar ,AL-FALAH UNIVERSITY ; Neha ,AL-FALAH UNIVERSITY

Hacking, Hacker, Ethical Hacking, Penetration Testing, Information Security.

Vulnerability scanners are information security tools able to detect security weaknesses on hosts in a network. Secure hosts in a proactive manner. A proactive approach is considered to be better than reactive approaches followed by, for example, intrusion detection systems, because prevention is better than cure. There are many problems and disadvantages of currently available VSs, such as hampering system resources while conducting scans. This paper introduces a conceptual model for vulnerability forecasting. The model uses intelligent techniques to improve on the efficiency of currently available. The model aims to do vulnerability forecasting specifically by predicting the number of known vulnerabilities that will occur in the near future by using intelligent techniques and vulnerability history data. The model is tested by means of a prototype and an evaluation of the model's results is also provided in the paper.
    [1] http://en.wikipedia.org/wiki/Microsoft_Baseline_Security_Analyzer [2] http://blogs.microsoft.com/cybertrust/2012/10/22/microsoft-free-security-tools-microsoft-baseline-security-analyzer/ [3] http://www.tenable.com/products/nessus [4] http://www.rapid7.in/products/nexpose/ [5] http://en.wikipedia.org/wiki/Nmap [6] http://www.offensive-security.com/metasploit-unleashed/Msfpayload [7] Liu, Bingchang; Shi, Liang; Cai, Zhuhua; Li, Min; “Software vulnerability Discovery Techniques: A Survey” IEEE Conference Publication, DOI: 10.1109/MINES.2012.202, Page(s) 152-156, 2012 [8] Smith, Yurick, Doss “Ethical Hacking” IEEE Conference Publication, DOI: 10.1147/sj.403.0769, Page(s): 769-780 [9] Bradley, Rubin “Computer Security Education and Research: Handle with care” IEEE Conference Publication, DOI: 10.1109/MSP.2006.146, Page(s): 56-59 [10] Nilsson J., 2006, “Vulnerability Scanners”, Master of Science in this paper at Department of Computer and System Sciences, Royal Institute of Technology, Kista, Sweden
Paper ID: GRDJEV01I060037
Published in: Volume : 1, Issue : 6
Publication Date: 2016-06-01
Page(s): 43 - 47