AUTOMATIC ENDPOINT VULNERABILITY DETECTION OF LINUX AND OPEN SOURCE USING THE NATIONAL VULNERABILITY DATABASE

AUTOMATIC ENDPOINT VULNERABILITY DETECTION OF LINUX AND OPEN SOURCE USING THE NATIONAL VULNERABILITY DATABASE

4.11 - 1251 ratings - Source



A means to reduce security risks to a network of computers is to manage which computers can participate on a network, and control the participation of systems that do not conform to the security policy. Requiring systems to demonstrate their compliance to the policy can limit the risk of allowing non-complying systems access to trusted networks. One aspect of determining the risk a system represents is patch-level, a comparison between the availability of vendor security patches and their application on a system. A fully updated system has all available patches applied. Using patch level as a security policy metric, systems can evaluate as compliant, yet may still contain known vulnerabilities, representing real risks of exploitation. An alternative approach is a direct comparison of system software to public vulnerability reports contained in the National Vulnerability Database (NVD). This approach may produce a more accurate assessment of system risk for several reasons including removing the delay caused by vendor patch development and by analyzing system risk using vender-independent vulnerability information. This work demonstrates empirically that current, fully patched systems contain numerous software vulnerabilities. This technique can apply to platforms other than those of Open Source origin. This alternative method, which compares system software components to lists of known software vulnerabilities, must reliably match system components to iv those listed as vulnerable. This match requires a precise identification of both the vulnerability and the software that the vulnerability affects. In the process of this analysis, significant issues arose within the NVD pertaining to the presentation of Open Source vulnerability information. Direct matching is not possible using the current information in the NVD. Furthermore, these issues support the belief that the NVD is not an accurate data source for popular statistical comparisons between closed and open source software.AUTOMATED SYSTEM ENDPOINT HEALTH EVALUATION USING THE NATIONAL VULNERABILITY DATABASE ... Matches Function Description Precise 7 $CVE_Name eq $systemPackage String match, including case e.g a#39; gimpa#39; will notanbsp;...


Title:AUTOMATIC ENDPOINT VULNERABILITY DETECTION OF LINUX AND OPEN SOURCE USING THE NATIONAL VULNERABILITY DATABASE
Author: Paul Aurthur Whyman
Publisher:Paul Arthur Whyman - 2008-06-01
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA