An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of inciden...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
De Gruyter
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/799e3428504b4e6da93b47baf739df6d |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:799e3428504b4e6da93b47baf739df6d |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:799e3428504b4e6da93b47baf739df6d2021-12-05T14:10:51ZAn empirical study on vulnerability assessment and penetration detection for highly sensitive networks2191-026X10.1515/jisys-2020-0145https://doaj.org/article/799e3428504b4e6da93b47baf739df6d2021-04-01T00:00:00Zhttps://doi.org/10.1515/jisys-2020-0145https://doaj.org/toc/2191-026XWith the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives.Wang LiweiAbbas RobertAlmansour Fahad M.Gaba Gurjot SinghAlroobaea RoobaeaMasud MehediDe Gruyterarticlenetwork globalizationsecurity controlpenetration testnetwork securitynetwork administratorssecurity vulnerabilitiesservice attacksScienceQElectronic computers. Computer scienceQA75.5-76.95ENJournal of Intelligent Systems, Vol 30, Iss 1, Pp 592-603 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
network globalization security control penetration test network security network administrators security vulnerabilities service attacks Science Q Electronic computers. Computer science QA75.5-76.95 |
spellingShingle |
network globalization security control penetration test network security network administrators security vulnerabilities service attacks Science Q Electronic computers. Computer science QA75.5-76.95 Wang Liwei Abbas Robert Almansour Fahad M. Gaba Gurjot Singh Alroobaea Roobaea Masud Mehedi An empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
description |
With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives. |
format |
article |
author |
Wang Liwei Abbas Robert Almansour Fahad M. Gaba Gurjot Singh Alroobaea Roobaea Masud Mehedi |
author_facet |
Wang Liwei Abbas Robert Almansour Fahad M. Gaba Gurjot Singh Alroobaea Roobaea Masud Mehedi |
author_sort |
Wang Liwei |
title |
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
title_short |
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
title_full |
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
title_fullStr |
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
title_full_unstemmed |
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
title_sort |
empirical study on vulnerability assessment and penetration detection for highly sensitive networks |
publisher |
De Gruyter |
publishDate |
2021 |
url |
https://doaj.org/article/799e3428504b4e6da93b47baf739df6d |
work_keys_str_mv |
AT wangliwei anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT abbasrobert anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT almansourfahadm anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT gabagurjotsingh anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT alroobaearoobaea anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT masudmehedi anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT wangliwei empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT abbasrobert empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT almansourfahadm empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT gabagurjotsingh empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT alroobaearoobaea empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks AT masudmehedi empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks |
_version_ |
1718371673599639552 |