Arm up administrators: automated vulnerability management

@article{Tian2004ArmUA,
  title={Arm up administrators: automated vulnerability management},
  author={Haitao Tian and Liusheng Huang and Zhi Zhou and Yonglong Luo},
  journal={7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.},
  year={2004},
  pages={587-593}
}
With the continuous flood of vulnerabilities of computers, vulnerability management is a very important task for administrators to keep systems as secure as possible. Facing numerous attackers armed with complicated, automated tools, current manual vulnerability management by administrators is so time-consuming, error-prone. Administrators also do need automated defensive tools. This paper proposes an open framework of automated vulnerability management that dramatically alleviates the burden… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-5 of 5 references

Vulnerability Assessment Scanners

J.Forristal, G. Shipley
Network Computing, • 2001
View 1 Excerpt

Christey, ‘Towards a Common Enumeration of Vulnerabilities’, 2nd Workshop Research with Security Vulnerability Databases

S.M.D.E. Mann
1999
View 1 Excerpt

Detecting security vulnerabilities in Remote TCP/IP Networks: An Approach using security scanners

J.L.Lerida, S.M.Grackzyr, A.Vina, J.M.Andujar
Proceedings of IEEE 33rd Annual International Carnahan Conference, • 1999
View 1 Excerpt

What are the vulnerabilities that we are looking at today ?

Eloef. P Venter. H. S
-1

Similar Papers

Loading similar papers…