n South African Computer Journal - Harmonising vulnerability categories : research article
|Article Title||Harmonising vulnerability categories : research article|
|© Publisher:||South African Computer Society (SAICSIT)|
|Journal||South African Computer Journal|
|Author||H.S. Venter and J.H.P. Eloff|
|Publication Date||Dec 2002|
|Pages||24 - 31|
|Keyword(s)||C.2, D.4.6, Firewall, H.1.1, Internet information security, Intrusion Detection System (IDS), K.4.2, K.6.5, Network security, Scan, Vulnerability, Vulnerability categories and Vulnerability scanner|
A legion of vulnerabilities are potentially compromising the security status of IT industries infrastructures today. Current state-of-the-art intrusion detection systems (IDSs) can potentially identify some of the vulnerabilities. Each IDS defines its own and unique list of vulnerabilities, making it cumbersome for organisations to assess the completeness and reliability of vulnerability scans. What This furthermore complicates the matter of determining the degree to which a specific IDS complies to with the security requirements of a specific organisation. This paper presents an approach to harmonise different sets of vulnerabilities as currently used by state-of-the-art IDS tools.
Article metrics loading...