Back close

Vulnerability assessment methods – A review

Publication Type : Journal Article

Thematic Areas : TIFAC-CORE in Cyber Security

Publisher : Communications in Computer and Information Science

Source : Advances in Network Security and Applications (pp. 1-10). Springer Berlin Heidelberg.

Url : http://www.scopus.com/inward/record.url?eid=2-s2.0-79960424491&partnerID=40&md5=1bcef85cfddafe4a8e8f74bb8689768f

ISBN : 9783642225390

Keywords : Algorithms, Attack tree, Graph-based, Honepots, Mobile ambients, Network security, Plant Extracts, Rating, Research, Trees (mathematics), Vulnerability assessments

Campus : Amritapuri

School : Centre for Cybersecurity Systems and Networks

Center : TIFAC CORE in Cyber Security

Department : cyber Security

Year : 2011

Abstract : This paper reviews the major contributions in the field of Vulnerability Assessment from 1990 onwards. Even well administered networks are vulnerable to attack .Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. Researchers have proposed a variety of methods like graph-based algorithms to generate attack trees (or graphs), black-box and whitebox analysis, using Mobile Ambients, using Honepots, different Vulnerability tools and their Scoring System's, and so on. After surveying lot of research papers in the field, the amount of existing works for each method is identified and classified. Especially, the graph-based algorithms itself is a major area for researchers. The paper concludes with some inferences and results obtained in each method so can be used as a guideline for researchers. © 2011 Springer-Verlag.

Cite this Research Publication : H. V. Nath, “Vulnerability assessment methods - A review”, Communications in Computer and Information Science, vol. 196 CCIS, pp. 1-10, 2011.

Admissions Apply Now