International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 148 - Number 13 |
Year of Publication: 2016 |
Authors: Ramchandra Yadav, Raghu Nath Verma, Anil Kumar Solanki |
10.5120/ijca2016911216 |
Ramchandra Yadav, Raghu Nath Verma, Anil Kumar Solanki . An Improved Model for Analysis of Host Network Vulnerability. International Journal of Computer Applications. 148, 13 ( Aug 2016), 12-16. DOI=10.5120/ijca2016911216
With all the news on cyber attacks and computer security in the last few years, it does not take much time to realize that some action must be taken to protect our organization before it hits close to our home. In fact, security has gone from backroom to the boardroom in a lightning speed. Network security depends on most of network configuration and vulnerabilities. Each machines overall susceptibility to attack depends upon the vulnerabilities of another machine. An attacker tries to exploit the least secure system by small attacks iteratively, where each exploit in the network provide the platform for subsequent exploit. Such a series is known as attack path and the set of all possible paths will form an attack graph. By their highly interdependencies, it is much complex to draw traditional vulnerability analysis. Several works have been done to construct an attack graphs. The goal of this paper is to provide a framework, architecture, and an intelligent approach to vulnerability analysis by utilizing the concept of automated scanning tools. By the changing environment, conducting a periodic in-house vulnerability assessment is very much essential.