Employing Miniaturized Computers for Distributed Vulnerability Assessment

被引:0
|
作者
Hu, Yi [1 ]
Sulek, Dustin [1 ]
Carella, Anthony [1 ]
Cox, Joshua [1 ]
Frame, Allyson [1 ]
Cipriano, Karen [1 ]
Wang, Hong-xia [2 ]
机构
[1] Northern Kentucky Univ, Dept Comp Sci, Highland Hts, KY 41099 USA
[2] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Sichuan, Peoples R China
关键词
Vulnerability Assessment; Raspberry Pi; Cloud; Metasploil; Penetration Testing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Vulnerability assessment is the practice of testing a computer system, network or application to identify, measure and rank vulnerabilities within the system. This project's goal is to create a distributed vulnerability assessment architecture utilizing multiple miniaturized computers such as Raspberry Pi 2 Model B. The scheme delegates scanning tasks to low-cost and self-contained miniaturized devices for pursuing vulnerability assessment to achieve load balancing and enhanced performance. A cloud based dashboard application allows each miniaturized computer to register itself and controls the vulnerability assessment process for multiple networks. This allows the security professional to conduct assessment process and view vulnerability reports remotely. This paper describes the detailed design and implementation of the proposed architecture. The performance and assessment results prove the viability of automated vulnerability assessment using miniaturized computers.
引用
收藏
页码:57 / 61
页数:5
相关论文
共 50 条
  • [1] Advanced Vulnerability Assessment Tool for Distributed Systems
    Acs, Sandor
    Kozlovszky, Miklos
    Kotcauer, Peter
    [J]. HIGH-PERFORMANCE COMPUTING INFRASTRUCTURE FOR SOUTH EAST EUROPE'S RESEARCH COMMUNITIES: RESULTS OF THE HP-SEE USER FORUM 2012, 2014, 2 : 139 - 146
  • [2] An improvement for a mathematical model for distributed vulnerability assessment
    Bognar, Laszlo
    Joos, Antal
    Nagy, Balint
    [J]. ACTA UNIVERSITATIS SAPIENTIAE-MATHEMATICA, 2018, 10 (02) : 203 - 217
  • [3] ESTIMATING VULNERABILITY OF COMPUTERS TO LIGHTNING
    HILL, RD
    [J]. INSTRUMENTS & CONTROL SYSTEMS, 1972, 45 (09): : 100 - &
  • [4] A Miniaturized Impedance Transformer Employing PGS on GaAs
    Yun, Young
    Jeong, Jang-Hyeon
    [J]. MICROWAVE JOURNAL, 2013, 56 (01) : 106 - +
  • [5] Vulnerability assessment of a power transmission network employing complex network theory in a resilience framework
    Dipanjan Bose
    Chandan Kumar Chanda
    Abhijit Chakrabarti
    [J]. Microsystem Technologies, 2020, 26 : 2443 - 2451
  • [6] Vulnerability assessment of a power transmission network employing complex network theory in a resilience framework
    Bose, Dipanjan
    Chanda, Chandan Kumar
    Chakrabarti, Abhijit
    [J]. MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2020, 26 (08): : 2443 - 2451
  • [7] Vulnerability assessment and defence strategy to site distributed generation in smart grid
    Nayak, Jay
    Al-Anbagi, Irfan
    [J]. IET SMART GRID, 2022, 5 (03) : 161 - 176
  • [8] Non-intrusive techniques for vulnerability assessment of services in distributed systems
    Genge, Bela
    Graur, Flavius
    Enachescu, Calin
    [J]. 8TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2014, 2015, 19 : 12 - 19
  • [9] Distributed control with personal computers
    VanDoren, V
    [J]. CONTROL ENGINEERING, 1996, 43 (07) : 112 - 112
  • [10] Distributed control with personal computers
    VanDoren, V
    [J]. CONTROL ENGINEERING, 1996, : 67 - 67