Evaluation of security vulnerability scanners for small and medium enterprises business networks resilience towards risk assessment

Ilias Chalvatzis, Dimitrios A. Karras, Rallis Papademetriou

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1323 Downloads (Pure)

    Abstract

    Risk Assessment has been identified as a critical issue in computer infrastructures, especially in medium to large scale organizations and enterprises. The goal of this research report is to provide a virtual machine based framework for testing the performance of vulnerability scanners applied to such enterprises, focused to small and medium size ones. Moreover, the purpose of this paper is to compare three of the most wellknown free vulnerability scanning solutions (Nessus, OpenVAS, Nmap Scripting Engine) in regards to how they can be used to automate the process of Risk Assessment in an organization, based on the herein presented experimental evaluation framework involving virtual machine testing.
    Original languageEnglish
    Title of host publicationProceedings of 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)
    Place of PublicationUSA
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Number of pages7
    Volume1
    ISBN (Electronic)978-1-7281-1223-7, 978-1-7281-1222-0
    ISBN (Print)978-1-7281-1224-4
    DOIs
    Publication statusPublished - 17 Oct 2019
    Event2019 IEEE International Conference on Artificial Intelligence and Computer Applications - Dalian, China
    Duration: 29 Mar 201931 Mar 2019

    Conference

    Conference2019 IEEE International Conference on Artificial Intelligence and Computer Applications
    Abbreviated titleICAICA 2019
    Country/TerritoryChina
    CityDalian
    Period29/03/1931/03/19

    Keywords

    • Vulnerability Scanning
    • Risk Assessment
    • Nessus
    • OpenVAS
    • Nmap Scripting Engine

    Fingerprint

    Dive into the research topics of 'Evaluation of security vulnerability scanners for small and medium enterprises business networks resilience towards risk assessment'. Together they form a unique fingerprint.

    Cite this