An empirical study on vulnerability assessment and penetration detection for highly sensitive networks

With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of inciden...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Wang Liwei, Abbas Robert, Almansour Fahad M., Gaba Gurjot Singh, Alroobaea Roobaea, Masud Mehedi
Formato: article
Lenguaje:EN
Publicado: De Gruyter 2021
Materias:
Q
Acceso en línea:https://doaj.org/article/799e3428504b4e6da93b47baf739df6d
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:799e3428504b4e6da93b47baf739df6d
record_format dspace
spelling oai:doaj.org-article:799e3428504b4e6da93b47baf739df6d2021-12-05T14:10:51ZAn empirical study on vulnerability assessment and penetration detection for highly sensitive networks2191-026X10.1515/jisys-2020-0145https://doaj.org/article/799e3428504b4e6da93b47baf739df6d2021-04-01T00:00:00Zhttps://doi.org/10.1515/jisys-2020-0145https://doaj.org/toc/2191-026XWith the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives.Wang LiweiAbbas RobertAlmansour Fahad M.Gaba Gurjot SinghAlroobaea RoobaeaMasud MehediDe Gruyterarticlenetwork globalizationsecurity controlpenetration testnetwork securitynetwork administratorssecurity vulnerabilitiesservice attacksScienceQElectronic computers. Computer scienceQA75.5-76.95ENJournal of Intelligent Systems, Vol 30, Iss 1, Pp 592-603 (2021)
institution DOAJ
collection DOAJ
language EN
topic network globalization
security control
penetration test
network security
network administrators
security vulnerabilities
service attacks
Science
Q
Electronic computers. Computer science
QA75.5-76.95
spellingShingle network globalization
security control
penetration test
network security
network administrators
security vulnerabilities
service attacks
Science
Q
Electronic computers. Computer science
QA75.5-76.95
Wang Liwei
Abbas Robert
Almansour Fahad M.
Gaba Gurjot Singh
Alroobaea Roobaea
Masud Mehedi
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
description With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives.
format article
author Wang Liwei
Abbas Robert
Almansour Fahad M.
Gaba Gurjot Singh
Alroobaea Roobaea
Masud Mehedi
author_facet Wang Liwei
Abbas Robert
Almansour Fahad M.
Gaba Gurjot Singh
Alroobaea Roobaea
Masud Mehedi
author_sort Wang Liwei
title An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
title_short An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
title_full An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
title_fullStr An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
title_full_unstemmed An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
title_sort empirical study on vulnerability assessment and penetration detection for highly sensitive networks
publisher De Gruyter
publishDate 2021
url https://doaj.org/article/799e3428504b4e6da93b47baf739df6d
work_keys_str_mv AT wangliwei anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT abbasrobert anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT almansourfahadm anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT gabagurjotsingh anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT alroobaearoobaea anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT masudmehedi anempiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT wangliwei empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT abbasrobert empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT almansourfahadm empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT gabagurjotsingh empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT alroobaearoobaea empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
AT masudmehedi empiricalstudyonvulnerabilityassessmentandpenetrationdetectionforhighlysensitivenetworks
_version_ 1718371673599639552