Evaluation of security vulnerability scanners for small and medium enterprises business networks resilience towards risk assessment

Ilias Chalvatzis, Dimitrios A. Karras, Rallis Papademetriou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

912 Downloads (Pure)

Abstract

Risk Assessment has been identified as a critical issue in computer infrastructures, especially in medium to large scale organizations and enterprises. The goal of this research report is to provide a virtual machine based framework for testing the performance of vulnerability scanners applied to such enterprises, focused to small and medium size ones. Moreover, the purpose of this paper is to compare three of the most wellknown free vulnerability scanning solutions (Nessus, OpenVAS, Nmap Scripting Engine) in regards to how they can be used to automate the process of Risk Assessment in an organization, based on the herein presented experimental evaluation framework involving virtual machine testing.
Original languageEnglish
Title of host publicationProceedings of 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)
Place of PublicationUSA
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages7
Volume1
ISBN (Electronic)978-1-7281-1223-7, 978-1-7281-1222-0
ISBN (Print)978-1-7281-1224-4
DOIs
Publication statusPublished - 17 Oct 2019
Event2019 IEEE International Conference on Artificial Intelligence and Computer Applications - Dalian, China
Duration: 29 Mar 201931 Mar 2019

Conference

Conference2019 IEEE International Conference on Artificial Intelligence and Computer Applications
Abbreviated titleICAICA 2019
Country/TerritoryChina
CityDalian
Period29/03/1931/03/19

Keywords

  • Vulnerability Scanning
  • Risk Assessment
  • Nessus
  • OpenVAS
  • Nmap Scripting Engine

Fingerprint

Dive into the research topics of 'Evaluation of security vulnerability scanners for small and medium enterprises business networks resilience towards risk assessment'. Together they form a unique fingerprint.

Cite this