Hiran V Nath
Assistant Professor
MB209, Department of Computer Science and Engineering, National Institute of Technology Calicut, NIT Campus PO, Calicut, Kerala - 673601, India +91-0495-2286819 hiranvnath[at]nitc[dot]ac[dot]in (email)
MB209, Department of Computer Science and Engineering, National Institute of Technology Calicut, NIT Campus PO, Calicut, Kerala - 673601, India +91-0495-2286819 hiranvnath[at]nitc[dot]ac[dot]in (email)
This paper reviews the major contributions in the field of Vulnerability Assessment from 1990 onwards. Even well administered networks are vulnerable to attack .Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. Researchers have proposed a variety of methods like graph-based algorithms to generate attack trees (or graphs), “black-box” and “whitebox” analysis, using Mobile Ambients, using Honepots, different Vulnerability tools and their Scoring System’s, and so on. After surveying lot of research papers in the field, the amount of existing works for each method is identified and classified. Especially, the graph-based algorithms itself is a major area for researchers. The paper concludes with some inferences and results obtained in each method so can be used as a guideline for researchers.
n/a