Explore chapters and articles related to this topic
Network Security Preliminaries
Published in Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody, Software-Defined Networking and Security, 2018
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
Network mapping is the study of the connectivity of networks at the layer 3 on a TCP/IP network. Network mapping discovers the devices, i.e., virtual or physical, on the network and their connectivity. There are two prominent techniques used today for network mapping. The first works on the data plane of the network and is called active probingActive probing. It is used to infer network topology based on router adjacencies. The second works on the control plane and infers autonomous system connectivity based on network management system, e.g., SNMP (Simple Network Management Protocol).
Vulnerability Management
Published in Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Information Security and Optimization, 2020
K.N.D. Saile, Phani Kumar Gajula
The following are a few best practices that need to be incorporated in the organization to improve vulnerability management (Qualys 2008).Discover network assets: Discovering the network assets helps to determine the areas that are more susceptible to attacks. Network mapping detects all network devices, which helps to discover widespread network assets.Classify the assets: Most of the networks in organizations have between 10 and 20 different categories of network assets.Run scans: Run accurate scans on the assets based on the ranking that is given in the vulnerability pre-assessment phase. This gives you full visibility on the level of risk associated with your assets. Efficient scanning helps to find out the vulnerabilities easily and perform further tasks intelligently. Prioritizing the scans play a major role.Technical reports: The reports need to be generated by the technical team with all the instructions to be followed to remediate the vulnerabilities. A proper instructed document/report helps in better identification and remediation of the vulnerability.Management reports: After the technical team has given the instruction report that is to be followed to remediate the vulnerability, the management report is generated to identify the vulnerability trends and mitigate the areas that cause these vulnerabilities. The management report is given by the senior management of the organization.Prioritize patching: Patches are the codes that are generated to resolve any problem. The patches are generated to fix the bugs with critical importance first, and later moving on to the ones with lower priority.Tracking remediation progress: Once the vulnerability is identified, it is called a trouble ticket. Once a ticket is generated, the vulnerability management system starts to resolve the issues and keeps track of all the remediation process step by step. The best practice is to keep track of the different patches that are released by the product-based organization at regular intervals and update the system to avoid the vulnerabilities.
Global perspectives for biochar application in the remediation of heavy metal-contaminated soil: a bibliometric analysis over the past three decades
Published in International Journal of Phytoremediation, 2023
Kehui Liu, Jiayi Liang, Ningning Zhang, Guangluan Li, Jieyi Xue, Keyi Zhao, Yi Li, Fangming Yu
In the network mapping, one node represents an analysis object. The node size represents the frequency. A line connecting two nodes indicates that there is a relationship between these two nodes. The count frequency (CF) and betweenness centrality (BC) of these nodes were used to assess the importance of each node in the mapping. A node with a high BC is likely to be situated between two large communities or subnetworks; hence, the term betweenness, which is surrounded by a purple circle, has a relatively high BC value (≥0.1), indicating its vital role in mapping and extensive connections to other nodes (Chen 2004, 2017; Yang and Meng 2019). Burst strength (BS) was used to assess the strength of the burst keywords, i.e., where more attention was given in a short time (Chen 2004, 2017; Guan et al.2021; Liu et al.2022).
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
- Once preliminary information is obtained, the tester looks for any security gap or vulnerability that can be exploited to conduct the attack. Activities include port scanning, network mapping, network enumeration, and host finger printing, for example to detect open ports and live hosts, devices, systems and services, as well as identifying the presence and limitations of firewalls, intrusion detection/prevention systems and locations of devices such as routers and switches.
Visualization analysis of rainfall-induced landslides hazards based on remote sensing and geographic information system-an overview
Published in International Journal of Digital Earth, 2023
Zhengli Yang, Heng Lu, Zhijie Zhang, Chao Liu, Ruihua Nie, Wanchang Zhang, Gang Fan, Chen Chen, Lei Ma, Xiaoai Dai, Min Zhang, Donghui Zhang
In terms of the analysis of author cooperation and high productivity author, the data in the document sample database was retrieved and imported into CiteSpace (version 6.1.R2) for processing. To facilitate the clear display of the documents-based knowledge mapping (Chen 2004; Chen 2006; Chen 2016), the software parameters were set first, and the time span was selected as 1995-2022. The time slice was set as follows: the node type was selected as Author, Pathfinder, and MST were chosen for tailoring the network mapping, and the remaining parameters were selected as default values. Using the CiteSpace author co-occurrence and cooperation analysis function, the core author groups and their cooperative relationships were visualized in Figure 4. The authors published more than 30 papers, and their representative works are shown in Table 4. In Figure 4, a dot represents an author. The large the dot radius is, the more papers the author publishes. The lines between the dots represent the scientific research cooperation between the authors. Figure 4 shows a specific relationship between most authors, which is reflected in multiple core author groups. The largest core author group is centered on PRADHAN B, and the core author group is closely related to other author groups. Table 4 indicates that the team publishes 57 papers, which have been cited 6,106 times in total, and ranks first in the number of articles published and the total number of citations, showing that the team is the most influential core author group in this field. The second-ranked core author group is the BUI T author group. Figure 4 indicates that the core author group is also closely related to other core author groups. Still, its scientific research cooperation is not as extensive as that of the PRADHAN B core author group. Table 4 intuitively shows that the BUI T team publishes 40 papers, which have been cited 4,507 times, and makes a lot of contributions to this field. Figure 4 demonstrates that although the core author groups of the third-ranked PHAMT and the fourth-ranked CHEN W have more academic exchanges with other scientific research teams, their cooperation is not as extensive and close as that of the previous two core author groups.