Skip to main content

Remote Automated Vulnerability Assessment and Mitigation in an Organization LAN

  • Conference paper
  • First Online:
  • 550 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 127))

Abstract

The process of making the network of an organization (an enterprise or an institution) fool-proof and secure holds great importance in today’s interconnected world. Any possible backdoor entry into any of the workstations in a large interconnected organizational network has the potential of a severe security breach that could prove fatal to the integrity of the organization. Strong and automated solutions are required that provide as a complete package, a sound vulnerability assessment, and satisfactory mitigation should a compromise in any workstation is detected. This paper explores the need and creation of such a complete security package.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. The Benefits of a Vulnerability Assessment. https://www.hitachi-systems-security.com/blog/the-benefits-of-a-vulnerability-assessment/. Last accessed 6 Dec 2019

  2. Wang Y, Yang J (2017) Ethical hacking and network defense: choose your best network vulnerability scanning tool. In: International conference on advanced information networking and application workshops (WAINA), vol 31. IEEE, pp 110–113

    Google Scholar 

  3. Guo F, Yu Y, Chiueh TC (2005) Automated and safe vulnerability assessment. In: Annual computer security applications conference (ACSAS05), vol 21. IEEE, p 10

    Google Scholar 

  4. Liu C, Richardson DJ (2000) Ethical hacking and network defense: automated security checking and patching using Testtalk. In: International conference on automated software engineering, Proceedings ASE, vol 15. IEEE, pp 261–264

    Google Scholar 

  5. Lukanta R, Asnar Y, Kistijantoro AI (2014) A vulnerability tool for session management vulnerabilities. In: International conference on data and software engineering (ICODSE). IEEE, pp 1–6

    Google Scholar 

  6. Introduction to the Nikto Web Application Vulnerability Scanner. https://resources.infosecinstitute.com/introduction-nikto-web-application-vulnerability-scanner/#gref. Last accessed 6 Dec 2019

  7. Im SY, Shin SH, Roh BH (2016) Performance evaluation of network scanning tool with operation of firewall. In: International conference on ubiquitous and future networks (ICUFN), vol 8. IEEE, pp 876–881

    Google Scholar 

  8. Mukherjee S, Sen P, Bora S, Pradhan C (2015) SQL injection: a sample review. In: International conference on computing communication and networking technologies (ICCCNT), vol 6. IEEE, pp 1–7

    Google Scholar 

  9. Almashhadani AO, Kaiiali M, Sezer S, OKane P (2019) A multi-classifier network-based crypto ransomware detection system: a case study of Locky ransomware. In: IEEE Access, vol 7. IEEE, pp 47053–47067

    Google Scholar 

  10. How Hackable is your password? https://edition.cnn.com/2019/04/22/uk/most-common-passwords-scli-gbr-intl/index.html. Last accessed 6 Dec 2019

  11. Welcome to Paramiko. http://www.paramiko.org/. Last accessed 6 Dec 2019

  12. Advanced Encryption Standard. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Last accessed 6 Dec 2019

  13. File Encryption And Decryption Using Python. https://blog.eduonix.com/software-development/file-encryption-decryption-using-python/. Last accessed 6 Dec 2019

  14. VulnOS:2. https://www.vulnhub.com/entry/vulnos-2,147/. Last accessed 6 Dec 2019

  15. VulnOS:2 Walkthrough. https://medium.com/@Kan1shka9/vulnos-2-walkthrough-16b70b9fbe17. Last accessed 6 Dec 2019

  16. nmap(1)–Linux man page. https://linux.die.net/man/1/nmap. Last accessed 6 Dec 2019

  17. Support for Windows 7 ends in January 2020. https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-7-support. Last accessed 6 Dec 2019

  18. Windows by the numbers: Windows 10 hits late wall, stalls. https://www.computerworld.com/article/3199373/windows-by-the-numbers-windows-10-hits-late-wall-stalls.html. Last accessed 6 Dec 2019

  19. OpenVAS—Open Vulnerability Assessment Scanner. http://www.openvas.org/. Last accessed 6 Dec 2019

  20. NetUserChangePassword function. https://docs.microsoft.com/en-us/windows/win32/api/lmaccess/nf-lmaccess-netuserchangepassword. Last accessed 6 Dec 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Nishant Sharma or H. Parveen Sultana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, N., Parveen Sultana, H., Sayyad, A., Singh, R., Patil, S. (2021). Remote Automated Vulnerability Assessment and Mitigation in an Organization LAN. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_22

Download citation

Publish with us

Policies and ethics