International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 148 - Issue 13 |
Published: Aug 2016 |
Authors: Ramchandra Yadav, Raghu Nath Verma, Anil Kumar Solanki |
![]() |
Ramchandra Yadav, Raghu Nath Verma, Anil Kumar Solanki . An Improved Model for Analysis of Host Network Vulnerability. International Journal of Computer Applications. 148, 13 (Aug 2016), 12-16. DOI=10.5120/ijca2016911216
@article{ 10.5120/ijca2016911216, author = { Ramchandra Yadav,Raghu Nath Verma,Anil Kumar Solanki }, title = { An Improved Model for Analysis of Host Network Vulnerability }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 148 }, number = { 13 }, pages = { 12-16 }, doi = { 10.5120/ijca2016911216 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Ramchandra Yadav %A Raghu Nath Verma %A Anil Kumar Solanki %T An Improved Model for Analysis of Host Network Vulnerability%T %J International Journal of Computer Applications %V 148 %N 13 %P 12-16 %R 10.5120/ijca2016911216 %I Foundation of Computer Science (FCS), NY, USA
With all the news on cyber attacks and computer security in the last few years, it does not take much time to realize that some action must be taken to protect our organization before it hits close to our home. In fact, security has gone from backroom to the boardroom in a lightning speed. Network security depends on most of network configuration and vulnerabilities. Each machines overall susceptibility to attack depends upon the vulnerabilities of another machine. An attacker tries to exploit the least secure system by small attacks iteratively, where each exploit in the network provide the platform for subsequent exploit. Such a series is known as attack path and the set of all possible paths will form an attack graph. By their highly interdependencies, it is much complex to draw traditional vulnerability analysis. Several works have been done to construct an attack graphs. The goal of this paper is to provide a framework, architecture, and an intelligent approach to vulnerability analysis by utilizing the concept of automated scanning tools. By the changing environment, conducting a periodic in-house vulnerability assessment is very much essential.