A Vulnerability Assessment Tool Based on OVAL in Linux System
نویسندگان
چکیده
Open Vulnerability Assessment Language(OVAL) is a standard language which is used to detect the vulnerability of local system based on the system characteristics and configurations. It is suggested by MITRE. OVAL consists of XML schema and SQL query statements. XML schema defines the vulnarable points and SQL query detects the vulnerable and weak points. This paper designed and implemented the vulnerability assesment tool with OVAL to detect the weak points in Linux System. It has more readability, reliability, scalability and simplicity than traditional tools.
منابع مشابه
MulVAL: A Logic-based Network Security Analyzer
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice, two features are crucial. First, the model used in the analysis must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second, the...
متن کاملUnderground transportation system risk assessment to mitigate vulnerability against natural disasters through intelligent urban management
Quantitative and qualitative monitoring and evaluation of risk management programs will play an important role in the development of Tehran metropolitan railway transport. Considering the tectonic studies, seismic zones, land degradation and faults in north and south of Tehran, the development of underground railway lines, the assessment of the vulnerability of subway stations and the escalatio...
متن کاملIncreasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework
Mobile computing devices and the services offered by them are utilized by millions of users on a daily basis. However, they operate in hostile environments getting exposed to a wide variety of threats. Accordingly, vulnerability management mechanisms are highly required. We present in this paper a novel approach for increasing the security of mobile devices by efficiently detecting vulnerable c...
متن کاملTowards Central Vulnerability Management by Mobile Phone Operators
The application of XML-based approaches in passing vulnerability information between vulnerability management devices or software residing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile networks. Our proposed framework allows for a pro-active centra...
متن کاملCaspian Sea level fluctuation and Determination of Setback Line
In the past 25 years, rising of the Caspian Sea level, part of a natural treat to the sea, has inundated and destroyed many buildings and arable lands and threatened many inhabitations in coastal areas. The main reason for these damages is that the law-setback has lost its efficiency and human activities have proceeded seaward. The goal of this study is to introduce a proper setback line for th...
متن کامل