An empirical study on vulnerability assessment and penetration detection for highly sensitive networks

Author:

Wang Liwei1,Abbas Robert2,Almansour Fahad M.3,Gaba Gurjot Singh4,Alroobaea Roobaea5,Masud Mehedi5

Affiliation:

1. State Grid Hebei Electric Power Co., Ltd., Information and Communication Branch , Shijiazhuang , Hebei Province, 050000 , China

2. School of Engineering, Macquarie University , Macquarie Park , NSW 2113 , Australia

3. Depertment of Computer Science, College of Sciences and Arts in Rass, Qassim University , Buraydah 51452 , Saudi Arabia

4. School of Electronics and Electrical Engineering, Lovely Professional University , Phagwara 144411 , India

5. Department of Computer Science, College of Computers and Information Technology, Taif University , Taif , KSA

Abstract

Abstract With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives.

Publisher

Walter de Gruyter GmbH

Subject

Artificial Intelligence,Information Systems,Software

Reference36 articles.

1. Xiao-Xia W. Research on information security architecture of computer network. Digital Technol Appl. 2018;36(12):181–2.

2. Dongying L, Baohai Y. Research on information security strategy based on wireless network access. Digital Technol Appl. 2018;36(11):191–2.

3. Wu YX, Wang HF. Computer network information security risks and protective measures against the background of big data. J Luohe Vocat Tech Coll. 2019;4:20–2.

4. Böhme R, Félegyházi M. Optimal information security investment with penetration testing. International conference on decision and game theory for security. Berlin, Heidelberg: Springer; 2010, November. p. 21–37.

5. Louvieris P, Clewley N, Liu X. Effects-based feature identification for network intrusion detection. Neurocomputing. 2013;121:265–73.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Research on cloud server double end vulnerability detection based on heuristic genetic algorithm;Third International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2023);2023-10-10

2. Information Leakage Tracking Algorithms in Online Social Networks;Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering);2023-03

3. An Analysis of Vulnerability Scanners in Web Applications for VAPT;2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES);2022-05-20

4. Special section on Recent Trends in Information and Communication Technologies;Journal of Intelligent Systems;2021-01-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3