Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms

  • Jung-Taek Seo
  • Yun-ju Kim
  • Eung-Ki Park
  • Sang-won Lee
  • Taeshik Shon
  • Jongsub Moon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4223)


Because of worms which make use of vulnerability of computer systems, computer incidents are increasing. Although there is an opportunity to defend these attacks at an earlier stage, people undergo several serious disturbances because many administrators and users didn’t realize the gravity of the patch management, that is, the patch management system (PMS) prevents the intrusion. Prevention with "Prevention is better than cure." is very important. Therefore we need installing an effective patch management system. We designed and implemented the proposed framework which provides solutions for managing and distributing critical patches that resolve known security vulnerabilities and other stability issues with various platforms.


Client System Client Agent Multi Platform Patch Distribution Patch File 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lemos, R.: Microsoft publishes program to blast MSBlast, CNET News. com (January 6, 2004)Google Scholar
  2. 2.
    Lemos, R.: Hacker code could unleash Windows worm, CNET News. com (July 25, 2003)Google Scholar
  3. 3.
    Symantec Internet Security Threat Report vol. V, Symantec Corporation (March 2004)Google Scholar
  4. 4.
    CERT/Coordination Center : CERT Advisory,
  5. 5.
    Microsoft Corporation: Microsoft Security Bulletin,
  6. 6.
    Bashar, M.A., Krishnan, G., Kuhn, M.G.: Low-threat security patches and tools. In: Proceedings of the International Conference on Software Maintenance (1997)Google Scholar
  7. 7.
    PatchLink Corporation,
  8. 8.
    Ecora Software Corporation,
  9. 9.
    BigFix, Inc,
  10. 10.
  11. 11.
    St. Bernard Software,
  12. 12.
  13. 13.
    Gravity Storm Software,
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Seo, J.T., Yoon, J.B., Choi, D.S., Park, E.K., Sohn, T.S., Moon, J.S.: A study on the Patch Management Syste. In: Intranet, PACO 2004 (2004)Google Scholar
  18. 18.
    Seo, J.T., Choi, D.S., Park, E.K., Shon, T.S., Moon, J.S.: Patch Management System for Multiplatform Environment. In: PDCAT 2004 (2004)Google Scholar
  19. 19.
    Sohn, T.S., Moon, J.S., Seo, J.T., Im, E.K., Lee, C.W.: Safe Patch Distribution Architecture in Intranet Environments. In: SAM 2003 (2003)Google Scholar
  20. 20.
    Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21, 993–999 (1978)MATHCrossRefGoogle Scholar
  21. 21.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  22. 22.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jung-Taek Seo
    • 1
  • Yun-ju Kim
    • 1
  • Eung-Ki Park
    • 1
  • Sang-won Lee
    • 2
  • Taeshik Shon
    • 2
  • Jongsub Moon
    • 2
  1. 1.National Security Research InstituteDaejeonRepublic of Korea
  2. 2.CISTKorea University 1-GaSeoulRepublic of Korea

Personalised recommendations