Abstract
Vulnerability assessment of university computer network has become the need of the hour due to rapid increase in the number of vulnerabilities. The universities are technologically advancing at a much faster pace, and university network being open, large and diverse in nature is highly vulnerable which in turn makes it prone to attacks by malicious intent entities. Current paper discusses about detection and assessment of vulnerabilities in the computer network of Bundelkhand University Jhansi, Uttar Pradesh, India. To ensure the confidentiality, authenticity and integrity of computer network, timely detection and remediation of vulnerabilities are an indispensable task. University data being highly crucial and confidential demand for the network to be robust and secure. The vulnerability assessment of university computer network is done using a vulnerability scanning tool Nexpose which is an excellent and efficient scanning tool. The scan results were analyzed to determine vulnerabilities with critical severity using CVSS score. A vulnerability with its CVE ID can be searched for further details in National Vulnerability Database (NVD). The critical vulnerabilities for which exploits are available are of greater risk as compared to other vulnerabilities. Thus, critical vulnerabilities demand for early removal or remediation to ensure network robustness and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://en.wikipedia.org/wiki/National_Vulnerability_Database
https://docs.rapid7.com/metasploit/vulnerability-scanning-with-nexpose/
https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System
M. Alzahrani, Auditing Albaha University Network Security using in-house Developed Penetration Tool. J. Phys.: Conf. Ser. 978, 012093
R. Kumar, K. Tlhagadikgora, Internal network penetration testing using free/open source tools: network and system administration approach, in Advanced Informatics for Computing Research (ICAICR 2018). Communications in Computer and Information Science, vol. 956 (Springer, Singapore, 2018)
Y. Wang, J. Yang, Ethical hacking and network defense: choose your best network vulnerability scanning tool, in 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2017, pp. 110–113
N.I. Daud, K.A. Abu Bakar, M.S.M. Hasan, A case study on web application vulnerability scanning tools, in Science and Information Conference (2014), pp. 595–600
H. Holm, Performance of automated network vulnerability scanning at remediating security issues. Comput. Secur. 31(2), 164–175 (2012)
A. Tundis, W. Mazurczyk, M. Mühlhäuser, A review of network vulnerabilities scanning tools: types, capabilities and functioning, in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). Association for Computing Machinery, New York, NY, USA, Article 65 (2018), pp. 1–10
I. Chalvatzis, D.A. Karras, R.C. Papademetriou, Evaluation of security vulnerability scanners for small and medium enterprises business networks resilience towards risk assessment, in IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2019, pp. 52–58
M.U. Aksu, E. Altuncu, K. Bicakci, A First Look at the Usability of OpenVAS Vulnerability Scanner (2019)
S. Raza, F. Jaison, Maliyekkal, N. Choudhary, Remotely scanning organization’s internal network. Int. J. Trend Sci. Res. Dev. (IJTSRD) 4(6), 1139–1141 (2020). ISSN: 2456-6470
S. Patil, A. Jangra, M. Bhale, A. Raina, P. Kulkarni, Ethical hacking: the need for cyber security, in IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI 2017) (2017), pp. 1602–1606
L. Fei, F. Jing, Research on comprehensive risk of network assets and vulnerabilities, in IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2018, pp. 1787–1791
N. Schagen, K. Koning, H. Bos, C. Giuffrida, Towards automated vulnerability scanning of network servers, in Proceedings of the 11th European Workshop on Systems Security (EuroSec'18). Association for Computing Machinery, New York, NY, USA, Article 5 (2018), pp. 1–6
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chhillar, K., Shrivastava, S. (2022). Vulnerability Assessment of University Computer Network Using Scanning Tool Nexpose. In: Pundir, A.K.S., Yadav, N., Sharma, H., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1324-2_23
Download citation
DOI: https://doi.org/10.1007/978-981-19-1324-2_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1323-5
Online ISBN: 978-981-19-1324-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)