Skip to main content

Vulnerability Assessment of University Computer Network Using Scanning Tool Nexpose

  • Conference paper
  • First Online:
Recent Trends in Communication and Intelligent Systems

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 205 Accesses

Abstract

Vulnerability assessment of university computer network has become the need of the hour due to rapid increase in the number of vulnerabilities. The universities are technologically advancing at a much faster pace, and university network being open, large and diverse in nature is highly vulnerable which in turn makes it prone to attacks by malicious intent entities. Current paper discusses about detection and assessment of vulnerabilities in the computer network of Bundelkhand University Jhansi, Uttar Pradesh, India. To ensure the confidentiality, authenticity and integrity of computer network, timely detection and remediation of vulnerabilities are an indispensable task. University data being highly crucial and confidential demand for the network to be robust and secure. The vulnerability assessment of university computer network is done using a vulnerability scanning tool Nexpose which is an excellent and efficient scanning tool. The scan results were analyzed to determine vulnerabilities with critical severity using CVSS score. A vulnerability with its CVE ID can be searched for further details in National Vulnerability Database (NVD). The critical vulnerabilities for which exploits are available are of greater risk as compared to other vulnerabilities. Thus, critical vulnerabilities demand for early removal or remediation to ensure network robustness and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. https://en.wikipedia.org/wiki/National_Vulnerability_Database

  2. https://docs.rapid7.com/metasploit/vulnerability-scanning-with-nexpose/

  3. https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System

  4. M. Alzahrani, Auditing Albaha University Network Security using in-house Developed Penetration Tool. J. Phys.: Conf. Ser. 978, 012093

    Google Scholar 

  5. R. Kumar, K. Tlhagadikgora, Internal network penetration testing using free/open source tools: network and system administration approach, in Advanced Informatics for Computing Research (ICAICR 2018). Communications in Computer and Information Science, vol. 956 (Springer, Singapore, 2018)

    Google Scholar 

  6. Y. Wang, J. Yang, Ethical hacking and network defense: choose your best network vulnerability scanning tool, in 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2017, pp. 110–113

    Google Scholar 

  7. N.I. Daud, K.A. Abu Bakar, M.S.M. Hasan, A case study on web application vulnerability scanning tools, in Science and Information Conference (2014), pp. 595–600

    Google Scholar 

  8. H. Holm, Performance of automated network vulnerability scanning at remediating security issues. Comput. Secur. 31(2), 164–175 (2012)

    Google Scholar 

  9. A. Tundis, W. Mazurczyk, M. Mühlhäuser, A review of network vulnerabilities scanning tools: types, capabilities and functioning, in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). Association for Computing Machinery, New York, NY, USA, Article 65 (2018), pp. 1–10

    Google Scholar 

  10. I. Chalvatzis, D.A. Karras, R.C. Papademetriou, Evaluation of security vulnerability scanners for small and medium enterprises business networks resilience towards risk assessment, in IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2019, pp. 52–58

    Google Scholar 

  11. M.U. Aksu, E. Altuncu, K. Bicakci, A First Look at the Usability of OpenVAS Vulnerability Scanner (2019)

    Google Scholar 

  12. S. Raza, F. Jaison, Maliyekkal, N. Choudhary, Remotely scanning organization’s internal network. Int. J. Trend Sci. Res. Dev. (IJTSRD) 4(6), 1139–1141 (2020). ISSN: 2456-6470

    Google Scholar 

  13. S. Patil, A. Jangra, M. Bhale, A. Raina, P. Kulkarni, Ethical hacking: the need for cyber security, in IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI 2017) (2017), pp. 1602–1606

    Google Scholar 

  14. L. Fei, F. Jing, Research on comprehensive risk of network assets and vulnerabilities, in IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2018, pp. 1787–1791

    Google Scholar 

  15. N. Schagen, K. Koning, H. Bos, C. Giuffrida, Towards automated vulnerability scanning of network servers, in Proceedings of the 11th European Workshop on Systems Security (EuroSec'18). Association for Computing Machinery, New York, NY, USA, Article 5 (2018), pp. 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chhillar, K., Shrivastava, S. (2022). Vulnerability Assessment of University Computer Network Using Scanning Tool Nexpose. In: Pundir, A.K.S., Yadav, N., Sharma, H., Das, S. (eds) Recent Trends in Communication and Intelligent Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1324-2_23

Download citation

Publish with us

Policies and ethics