Research Article | Open Access | Download Full Text
Volume 2 | Issue 4 | Year 2024 | Article Id: CYS-V2I4P101 DOI: https://doi.org/10.59232/CYS-V2I4P101
Agentless Vulnerability Detection for Windows System and Network
R. Karthiban, S. Christ Michael Jeniston, S. Divya Sree, N.U. Haripriya, M. Harish, J. Lalith Kumar, S. Manikandan
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 06 Oct 2024 | 11 Nov 2024 | 30 Nov 2024 | 24 Dec 2024 |
Citation
R. Karthiban, S. Christ Michael Jeniston, S. Divya Sree, N.U. Haripriya, M. Harish, J. Lalith Kumar, S. Manikandan. “Agentless Vulnerability Detection for Windows System and Network.” DS Journal of Cyber Security, vol. 2, no. 4, pp. 2-4, 2024.
Abstract
Keywords
Audit policies, Defender settings, Firewall rules, Installed hotfixes, Scheduled tasks.
References
[1] Bing Zhang et al., “Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review,” ACM Computing Surveys, vol. 54, no. 9, pp. 1-35, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ömer Aslan et al., “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Electronics, vol. 12, no. 6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Asem Ghaleb, “Agentless Endpoint Security Monitoring Framework,” Electronic Theses and Dissertations (ETD), University of Victoria, 2019.
[Google Scholar] [Publisher Link]
[4] João Pedro Seara, and Carlos Serrão, “Automation of System Security Vulnerabilities Detection Using Open-Source Software,” Electronics, vol. 13, no. 5, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Santiago Figueroa-Lorenzo, Javier Añorga, and Saioa Arrizabalaga, “A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS,” ACM Computing Surveys, vol. 53, no. 2, pp. 1-53, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Kismat Chhillar, and Saurabh Shrivastava, “Vulnerability Assessment of University Computer Network Using Scanning Tool Nexpose,” Recent Trends in Communication and Intelligent Systems, pp. 207-214, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Francisco R.P. da Ponte, Emanuel B. Rodrigues, and César L.C. Mattos, “CVEjoin: An Information Security Vulnerability and Threat Intelligence Dataset,” Advanced Information Networking and Applications, pp. 380-392, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Sagar Rahalkar, Quick Start Guide to Penetration Testing with NMAP, OpenVAS and Metasploit, 1st ed., Apress, Berkeley, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Pooja D. Pandit, “Nessus: Study of a Tool to Assess Network Vulnerabilities,” 2021.
[10] U. Kumaran et al., “Web Vulnerability Scanner,” Advances in Information Communication Technology and Computing, pp. 193-207, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Rabaya Sultana Mim, Toukir Ahammed, and Kazi Sakib, “Automated Software Vulnerability Detection in Statement Level Using Vulnerability Reports,” Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, pp. 454-455, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Xigao Li et al., “Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning,” Proceedings of the ACM Web Conference, pp. 2284-2294, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Michał Walkowski, Jacek Oko, and Sławomir Sujecki, “Vulnerability Management Models Using a Common Vulnerability Scoring System,” Applied Sciences, vol. 11, no. 18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Dipali N. Railkar, and Shubhalaxmi Joshi, “A Study on Vulnerability Scanning Tools for Network Security,” International Journal of Scientific Research in Computer Science Engineering and Information Technology, vol. 8, no. 6, pp. 340-350, 2022.
[Google Scholar] [Publisher Link]
[15] A. Sowmyashree, and H.S. Guruprasad, “Evaluation and Analysis of Vulnerability Scanners: Nessus and OpenVAS,” International Research Journal of Engineering and Technology, vol. 7, no. 5, pp. 2068-2073, 2020.
[Google Scholar] [Publisher Link]