Network Vulnerability Analysis

Authors

  • Ajah Ifeyinwa Ebonyi State University, Enugu Express Road, Abakiliki, 840001, Nigeria
  • Agu Sunday Madonna University, P.M.B 05, Elele 500001, Nigeria
  • Ezeanyeji Pater C Chukwuemeka Odumegwu Ojukwu University, Uli, 420001, Nigeria

Keywords:

Network, Vulnerability, Analysis, Assessment, Network Mapping

Abstract

A network vulnerability analysis (NVA) is the process of identifying and evaluating those security loopholes that might exist in an enterprise before the network is hacked. This paper discussed network vulnerability analysis and its processes. It also demonstrate some approaches to conducting vulnerability analysis for any network environment using manual tools and showed other automatic tools used for conducting vulnerability analysis. The paper also addressed the reasons for network vulnerability analysis and finally discussed vulnerabilities of the network. Findings from this study indicate that network vulnerability analysis is important. However, conducting vulnerability analysis does not necessarily prevent security on its own; instead, it reflects a snapshot of the environment at a particular point in time and pointed out the rationale for regular conducting of vulnerability analysis.

References

I. Shakeel. “The Art of Network VulnerabilityAssessment.” Internet: http://resources.infosecinstitute.com/wp-content/uploads/The-Art-of-Network Vulnerability-Assessme, [Jun. 19, 2018].

Isaca. “Security Vulnerability Assessment.” Internet: https://cybersecurity.isaca.org/info/cyber-aware/images/ISACA_WP_Vulnerability_Assessment_1117.pdf, 2017 [Jun. 19, 2018].

E. Carabott. “Why You Need to Run a Vulnerability Assessment.” Internet: https://techtalk.gfi.com/vulnerability-assessment/, 2011 [Jun. 19, 2018].

R. Bond. “The Benefits of a Vulnerability Assessment.” Internet: https://www.hitachi-systems-security.com/blog/the-benefits-of-a-vulnerability-assessment/, 2017 [Jun. 19, 2018].

L. Pier. “Network-based vulnerability assessment.” Internet: https://pdfs.semanticscholar.org/presentation/c504/91c807ee198ae5825b026de1a4bacb97c473.pdf, 2018 [Jun. 19, 2018].

N. Poolsappasit. “Towards An Efficient Vulnerability Analysis Methodology For Better Security Risk Management.” Department of Computer Science, Colorado State University, Internet: https://dspace.library.colostate.edu/bitstream/handle/10217/40477/Poolsappasit_colostate_0053A_10071.pdf;sequence=1 2010 [Jun. 20, 2018].

R. Noam. “Automating Vulnerability Assessment, Beyond Security.” Internet: http://beyondsecurity.com/ AVDS_Whitepaper.pdf, 2018. [Jun. 20, 2018].

S. Zhang, O. Xinming, & H. John. “Effective Network Vulnerability Assessment through Model Abstraction.” Internet: http://people.cs.ksu.edu/~zhangs84/papers/dimva11.pdf, 2011 [Jun. 20, 2018].

P. Cynthia, & P. Laura. “A Graph-Based System for Network-Vulnerability Analysis.” Internet: http://web2.utc.edu/~djy471/CPSC4660/graph-vulnerability.pdf, 1999 [Jun. 20, 2018].

R. H. Ronda. & L. F. Kelvin. “The Network Vulnerability Tool (NVT) – A System Vulnerability Visualization Architecture.” Internet: https://csrc.nist.gov/csrc/media/publications/conference-paper/1999/10/21/proceedings-of-the-22nd-nissc-1999/documents/papers/p7.pdf, 1999 [Jun. 20, 2018].

J. C. Iyiama. CSC 911. Class Lecture, Topic: “Vulnerabilities of Network.” Presco Campus, Department of Computer Science, Ebonyi State University, Nigeria, Sep. 14, 2018.

Downloads

Published

2019-08-12

How to Cite

Ifeyinwa, A. ., Sunday, A. ., & Pater C, E. . (2019). Network Vulnerability Analysis. International Journal of Computer (IJC), 34(1), 129–139. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/1432

Issue

Section

Articles