An Implementation of an Vulnerability Management in Complex Networks and Defining Severity

Authors

  • Rikam P alkar Department of Master of Computer Applications, Veermata Jijabai Technological Institute,Mumbai, India
  • Swati Chopade Department of Master of Computer Applications, Veermata Jijabai Technological Institute,Mumbai, India

Keywords:

Network, VMP

Abstract

Complex systems are found in an extensive variety of areas from technological and social to biological environments. In spite of this scope of uses and settings in which complex systems are utilized as models, examines propose that numerous genuine systems are represented by a comparable elements. An important characteristic is that in general such networks are robust against failures but vulnerable against targeted attacks. Impossible to miss trademark: resilience. In this technological era business endeavor to stay aware of evolving technology, it implies that they have a high capacity to absorb changes. However, resilience mechanisms are not present per se in technological networks. Thus, this work presents a framework for vulnerability assessment, vulnerability analysis and vulnerability management in versatile technological networks

 

References

“CWE- Common Weakness Enumeration”,Available: http://nvd.nist.gov/

“NVD Data Feed and Product Integration”, National Vulnerability Database, Available: http://nvd.nist.gov/download.cfm

N. W. Adger,“Vulnerability,” Global Environmental Change, no. 3, pp. 268–281, August.

A. Reka, J. Hawoong, and B. Albert-Laszlo,“Error and attack tolerance of complex networks,” Nature, no. 6794, pp. 378–382, July.

“CVE, Common Vulnerabilities and Exposures.” http://cve.mitre.org/

http://www.metasploit.com/

http://www.tenable.com/products/nessus

M.E.J. Newman "Analysis of weighted networks", The American Physical Society.

“The OVAL Language.” http://oval.mitre.org/ - Open vulnerability and assessment language.

Downloads

Published

2018-06-30

How to Cite

[1]
R. P. alkar and S. Chopade, “An Implementation of an Vulnerability Management in Complex Networks and Defining Severity”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 6, no. 3, pp. 35–38, Jun. 2018.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.