2011
DOI: 10.1108/09685221111173058
|View full text |Cite
|
Sign up to set email alerts
|

A quantitative evaluation of vulnerability scanning

Abstract: Purpose: Evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the platforms used.Design/methodology/approach: Both qualitative comparisons of functionality and quantitative comparisons of false positives and false negatives are made for seven different scanners. The quantitative assessment includes data from both authenticated and unauthenticated scans. Experiments were conducted on a computer network of 28 hosts with vari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 57 publications
(25 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…All three tools described above use the vulnerability scanner Nessus to collect these data. However, a recent accuracy test shows that Nessus misses more than half of the vulnerabilities when given access credentials to the hosts in a network and four out of five vulnerabilities when credentials are not given [28]. Thus, the automated scans on which the three tools rely are not reliable when individual vulnerabilities must be detected.…”
Section: Structured Methods For Security Assessmentmentioning
confidence: 99%
“…All three tools described above use the vulnerability scanner Nessus to collect these data. However, a recent accuracy test shows that Nessus misses more than half of the vulnerabilities when given access credentials to the hosts in a network and four out of five vulnerabilities when credentials are not given [28]. Thus, the automated scans on which the three tools rely are not reliable when individual vulnerabilities must be detected.…”
Section: Structured Methods For Security Assessmentmentioning
confidence: 99%
“…all the information regarding vulnerabilities that CySeMoL requires. Regarding ii), the scanning accuracy in terms of assessing vulnerabilities is studied in [5]. The accuracy in terms of assessing software, operating systems and such is something that will be examined in future works.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Conforms to The vulnerability scanner NeXpose was chosen in this project as it has demonstrated good results in previous tests [5]. NeXpose [8] is an active (i.e.…”
Section: Conforms Tomentioning
confidence: 99%
“…The builder receives the effective vulnerabilities of S through the output of a vulnerability scanning of each node of S [26]. The assessment can extend the vulnerabilities the scanning return by specifying potential vulnerabilities and/or those of the users.…”
Section: Modeling An Ict Systemmentioning
confidence: 99%