Penetration Testing: A Roadmap to Network Security

نویسندگان

  • Nitin A. Naik
  • Gajanan D. Kurundkar
  • Santosh D. Khamitkar
  • Namdeo V. Kalyankar
چکیده

Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastruc‐ ture and help to confirm the security measures. The objective of this paper is to explain methodology and methos behind penetra‐ tion testing and illustrate remedies over it, which will provide substantial value for network security Penetration testing should model real world attacks as closely as possible. An authorized and scheduled penetration testing will probably detected by IDS (Intrusion Detection System). Network penetration testing is done by either or manual automated tools. Penetration test can gather evidence of vulnerability in the network. Successful testing provides indisputable evidence of the problem as well as starting point for prioritizing remediation. Penetration testing focuses on high severity vulnerabilities and there are no false positive.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risk Analysis and Economic Load Dispatch Evaluation of Network with High Wind Power Penetration

This study based on investigation for integration wind power into conventional power system with its impact on fossil fuel generators and their generation management. Wind power as environmental friendly energy source can reduce the operational cost of the system due to considering no cost for energizing the generator in comparing with fossil fuel generators. However due to unpredictable nature...

متن کامل

Stochastic Security Constrained Transmission and Battery Expansion Planning In Integrated Gas-Electricity Systems Considering High Penetration of Renewable Resources..

In this study, a new model is proposed to solve the problem of transmission and battery expansion planning considering integrated electricity and gas systems. The presented model is a bi-level stochastic planning model, where transmission and battery expansion planning modeling is done on one level, and gas network modeling is done on the other level. Here, the impact of the high penetration of...

متن کامل

Trust Evaluation of the Current Security Measures Against Key Network Attacks

This paper security measures are implemented in enterprise network architecture and evaluated against current trend of network security as well as used various methods of penetration to confirm the vulnerabilities of the network within the confines of network security management. This was achieved by using a security distribution of Linux. The main focus of this paper is on Enumeration and Scan...

متن کامل

Simulated Penetration Testing and Mitigation Analysis

Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing countermeasures subject to a given budget...

متن کامل

Vulnerability Assessment and Penetration Testing

In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0912.3970  شماره 

صفحات  -

تاریخ انتشار 2009