TY - GEN
T1 - A Study on the Impact of Network Vulnerability Scanners on Network Security
AU - Chikohora, Edmore
AU - Mogomeli, Lerako
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/11/25
Y1 - 2021/11/25
N2 - Every computer network is bound to be a victim of network intruders which is why many security measures are put in place to protect computer networks from attackers and quickly recover from a network intrusion or attack. One of the most common security measures is the use of network scanners. Network scanners, scan the organizations network in an effort to locate any loop holes in the network's configuration or operation that can be exploited by attackers. The purpose of this study is to make a comparative analysis of the operation of network scanners, premising from discovering the network and scanning it for vulnerabilities. To analyze these techniques, on one hand we focused on the network discovery techniques which are passive discovery and active discovery. An evaluation of the two techniques was done to identify the benefits and areas of improvement. Secondly, we evaluated the two scanning techniques namely active and passive scanning to find possible ways to enhance their operations. A conclusion was drawn at the end which recommended a hybrid technique drawn from the strength of the two techniques.
AB - Every computer network is bound to be a victim of network intruders which is why many security measures are put in place to protect computer networks from attackers and quickly recover from a network intrusion or attack. One of the most common security measures is the use of network scanners. Network scanners, scan the organizations network in an effort to locate any loop holes in the network's configuration or operation that can be exploited by attackers. The purpose of this study is to make a comparative analysis of the operation of network scanners, premising from discovering the network and scanning it for vulnerabilities. To analyze these techniques, on one hand we focused on the network discovery techniques which are passive discovery and active discovery. An evaluation of the two techniques was done to identify the benefits and areas of improvement. Secondly, we evaluated the two scanning techniques namely active and passive scanning to find possible ways to enhance their operations. A conclusion was drawn at the end which recommended a hybrid technique drawn from the strength of the two techniques.
KW - Active directory technique
KW - Active scanning
KW - False positive.
KW - Passive directory technique
KW - Passive scanning
KW - Vulnerability scanners
UR - http://www.scopus.com/inward/record.url?scp=85126578808&partnerID=8YFLogxK
U2 - 10.1109/IMITEC52926.2021.9714598
DO - 10.1109/IMITEC52926.2021.9714598
M3 - Conference contribution
AN - SCOPUS:85126578808
T3 - 2021 3rd International Multidisciplinary Information Technology and Engineering Conference, IMITEC 2021
BT - 2021 3rd International Multidisciplinary Information Technology and Engineering Conference, IMITEC 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Multidisciplinary Information Technology and Engineering Conference, IMITEC 2021
Y2 - 23 November 2021 through 25 November 2021
ER -