Open Access Open Access  Restricted Access Subscription or Fee Access

Exploration of Taxonomical Vulnerabilities in Operating System V

A. Ramachandran, S. Ramachandran, A. Sathiyaraj

Abstract


Security in computer systems is important to ensure
reliable operation and protect the integrity of stored information.Faults in the implementation can be a threat to security for instances like penetrating an operating. These faults must be identified, detected, and corrected to ensure reliability. Thereby, security assessment of a system stands critical and is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities and finding such unknown vulnerabilities
remains a subjective process yet. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy. This paper provides a significant work done developing taxonomies of vulnerabilities in Operating systems. The vulnerabilities inherent in the Operating system should be addressed
appropriately, so they can be eliminated before accelerated by malicious software or hackers.


Keywords


Software Engineering, Fault Injection, Attack Injection, Vulnerability Assessment, Taxonomies.

Full Text:

PDF

References


http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5374427.

https://hercules.citadel.com/docs/301VulGuide.pdf,Pagevisited 051104.

http://www.secpoint.com/what-is-vulnerability-assessment.html

http://documents.iss.net/whitepapers/nva.pdf.

http://en.wikipedia.org/wiki/Zero-day_exploit, page visited 061203.

http://www.saintcorporation.com/solutions/vulnerabilityScan.html

http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-secaccess.

html

B.Marick, The craft of software testing, Prentice Hall.1995.

I. V. Krsul, Software Vulnerability Analysis, Ph.D. Thesis, Purdue

University, 1998.

www.symantec.com/connect/articles/vulnerability-assessment-survey.

Search security,

http://searchsecurity.techtarget.com/sDefinition/0, sid14_gci1176511,

html

R. Fussell, Vulnerability Assessment: Network based versus host based,

Technical report, SANS Institute, 2002.

Ivan Victor Krsul, Software Vulnerability Analysis, Unpublished

doctoral dissertation, Purdue University, IN, 1998.

U. Lindqvist and E. Jonsson, How to Systematically Classify

Computer Security Intrusions, Proceedings of the IEEE Symposium on

Security and Privacy, IEEE Computer Society Press, Los Alamitos,

CA, May 1997, pp. 154-163.

R. P. Abbot et al., Security Analysis and Enhancements of

Computer Operating Systems, In Technical Report NBSIR 76-1041,

Lawrence Livermore Laboratory, Institute for Computer Science and

Technology, 1976.

Peter G. Neumann and Donn B. Parker, A Summary of Computer

Misuse Techniques, In the Proceedings of 12th National Computer

Security Conference, Baltimore, 1989, pp. 396-407.

Aslam Taimur, A Taxonomy of Security Faults in the UNIX

operating system, Unpublished master‟s thesis, Purdue University, IN,

Matt Bishop and David Bailey, A Critical Analysis of Vulnerability

Taxonomies, Tech. Rep. CSE-96-11, Department of Computer Science,

University of California at Davis, 1996.

http://www.enggjournals.com/ijcse/abstract.html?file=12-04-02 -

,pp.224-234.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.