Abstract
The process of making the network of an organization (an enterprise or an institution) fool-proof and secure holds great importance in today’s interconnected world. Any possible backdoor entry into any of the workstations in a large interconnected organizational network has the potential of a severe security breach that could prove fatal to the integrity of the organization. Strong and automated solutions are required that provide as a complete package, a sound vulnerability assessment, and satisfactory mitigation should a compromise in any workstation is detected. This paper explores the need and creation of such a complete security package.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Benefits of a Vulnerability Assessment. https://www.hitachi-systems-security.com/blog/the-benefits-of-a-vulnerability-assessment/. Last accessed 6 Dec 2019
Wang Y, Yang J (2017) Ethical hacking and network defense: choose your best network vulnerability scanning tool. In: International conference on advanced information networking and application workshops (WAINA), vol 31. IEEE, pp 110–113
Guo F, Yu Y, Chiueh TC (2005) Automated and safe vulnerability assessment. In: Annual computer security applications conference (ACSAS05), vol 21. IEEE, p 10
Liu C, Richardson DJ (2000) Ethical hacking and network defense: automated security checking and patching using Testtalk. In: International conference on automated software engineering, Proceedings ASE, vol 15. IEEE, pp 261–264
Lukanta R, Asnar Y, Kistijantoro AI (2014) A vulnerability tool for session management vulnerabilities. In: International conference on data and software engineering (ICODSE). IEEE, pp 1–6
Introduction to the Nikto Web Application Vulnerability Scanner. https://resources.infosecinstitute.com/introduction-nikto-web-application-vulnerability-scanner/#gref. Last accessed 6 Dec 2019
Im SY, Shin SH, Roh BH (2016) Performance evaluation of network scanning tool with operation of firewall. In: International conference on ubiquitous and future networks (ICUFN), vol 8. IEEE, pp 876–881
Mukherjee S, Sen P, Bora S, Pradhan C (2015) SQL injection: a sample review. In: International conference on computing communication and networking technologies (ICCCNT), vol 6. IEEE, pp 1–7
Almashhadani AO, Kaiiali M, Sezer S, OKane P (2019) A multi-classifier network-based crypto ransomware detection system: a case study of Locky ransomware. In: IEEE Access, vol 7. IEEE, pp 47053–47067
How Hackable is your password? https://edition.cnn.com/2019/04/22/uk/most-common-passwords-scli-gbr-intl/index.html. Last accessed 6 Dec 2019
Welcome to Paramiko. http://www.paramiko.org/. Last accessed 6 Dec 2019
Advanced Encryption Standard. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Last accessed 6 Dec 2019
File Encryption And Decryption Using Python. https://blog.eduonix.com/software-development/file-encryption-decryption-using-python/. Last accessed 6 Dec 2019
VulnOS:2. https://www.vulnhub.com/entry/vulnos-2,147/. Last accessed 6 Dec 2019
VulnOS:2 Walkthrough. https://medium.com/@Kan1shka9/vulnos-2-walkthrough-16b70b9fbe17. Last accessed 6 Dec 2019
nmap(1)–Linux man page. https://linux.die.net/man/1/nmap. Last accessed 6 Dec 2019
Support for Windows 7 ends in January 2020. https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-7-support. Last accessed 6 Dec 2019
Windows by the numbers: Windows 10 hits late wall, stalls. https://www.computerworld.com/article/3199373/windows-by-the-numbers-windows-10-hits-late-wall-stalls.html. Last accessed 6 Dec 2019
OpenVAS—Open Vulnerability Assessment Scanner. http://www.openvas.org/. Last accessed 6 Dec 2019
NetUserChangePassword function. https://docs.microsoft.com/en-us/windows/win32/api/lmaccess/nf-lmaccess-netuserchangepassword. Last accessed 6 Dec 2019
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, N., Parveen Sultana, H., Sayyad, A., Singh, R., Patil, S. (2021). Remote Automated Vulnerability Assessment and Mitigation in an Organization LAN. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_22
Download citation
DOI: https://doi.org/10.1007/978-981-15-4218-3_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4217-6
Online ISBN: 978-981-15-4218-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)