Ferret: A host vulnerability checking tool

被引:5
|
作者
Sharma, A [1 ]
Martin, JR [1 ]
Anand, N [1 ]
Cukier, M [1 ]
Sanders, WH [1 ]
机构
[1] Univ Maryland, Ctr Reliabil Engn, Dept Mech Engn, College Pk, MD 20742 USA
关键词
security auditing tool; host vulnerabilities; security evaluation;
D O I
10.1109/PRDC.2004.1276595
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classified based on their location as application vulnerabilities, network vulnerabilities, or host vulnerabilities. This paper describes Ferret, a new software tool for checking host vulnerabilities. Ferret helps system administrators by quickly finding vulnerabilities that are present on a host. It is designed and implemented in a modular way: a different plug-in module is used for each vulnerability checked, and each possible output format is specified by a plug-in module. As a result, Ferret is extensible, and can easily be kept up-to-date through addition of checks for new vulnerabilities as they are discovered; the modular approach also makes it easy to provide specific configurations of Ferret tailored to specific operating systems or use environments. Ferret is a freely available open-source software implemented in Perl.
引用
收藏
页码:389 / 394
页数:6
相关论文
共 50 条
  • [1] OSV: OSPF VULNERABILITY CHECKING TOOL
    Kasemsuwan, Poonyavee
    Visoottiviseth, Vasaka
    [J]. PROCEEDINGS OF 2017 14TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2017,
  • [2] Host-Centric Model Checking for Network Vulnerability Analysis
    Hewett, Rattikorn
    Kijsanayothin, Phongphun
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 225 - 234
  • [3] The Research of Architecture Vulnerability Checking
    Zhang, Youdong
    Zhou, Haiyan
    Chen, Liqing
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 871 - 877
  • [4] CHECKING FOR TOOL COLLISIONS IN TURNING
    CHEN, SJ
    HINDUJA, S
    [J]. COMPUTER-AIDED DESIGN, 1988, 20 (05) : 281 - 289
  • [5] SDLcheck:: A model checking tool
    Levin, V
    Yenigün, H
    [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 378 - 381
  • [6] Automated checking for Windows host vulnerabilities
    Tamizi, Matin
    Weinstein, Matt
    Cukier, Michel
    [J]. 16TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2005, : 139 - 148
  • [7] Application of rapid method for checking egress system vulnerability
    Grimaz, S.
    Tosolini, E.
    [J]. FIRE SAFETY JOURNAL, 2013, 58 : 92 - 102
  • [8] Formally Analyzing Software Vulnerability Based on Model Checking
    Wang Chunlei
    Huang Minhuan
    He Ronghui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 615 - +
  • [9] ChaseT: A Tool for Checking Chase Termination
    De Francesco, Andrea
    Greco, Sergio
    Spezzano, Francesca
    Trubitsyna, Irina
    [J]. SCALABLE UNCERTAINTY MANAGEMENT, 2011, 6929 : 520 - 524
  • [10] αSPIN: A tool for abstract model checking
    María del Mar Gallardo
    Jesús Martínez
    Pedro Merino
    Ernesto Pimentel
    [J]. International Journal on Software Tools for Technology Transfer, 2004, 5 (2-3) : 165 - 184