A Survey on Ethical Hacking: Issues and Challenges

03/28/2021
by   Jean-Paul A. Yaacoub, et al.
0

Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of penetration tests. The objective of penetration tests is to make existing systems and their corresponding data more secure, efficient and resilient. In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap. In fact, any identified exploitable vulnerability will be used to conduct attacks on systems, devices, or personnel. This growing problem should be solved and mitigated to reach better resistance against these attacks. Moreover, the advantages and limitations of penetration tests are also listed. The main issue of penetration tests that it is efficient to detect known vulnerabilities. Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots. This can also be done by reinforcing the anomaly detection of intrusion detection/prevention system. In fact, security is increased by designing an efficient cooperation between the different security elements and penetration tests.

READ FULL TEXT

page 8

page 25

research
11/13/2019

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

It is critical to secure the Industrial Internet of Things (IIoT) device...
research
01/15/2018

Attack Potential in Impact and Complexity

Vulnerability exploitation is reportedly one of the main attack vectors ...
research
12/07/2018

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

In the world today computer networks have a very important position and ...
research
06/12/2021

Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services

Data Distribution Service (DDS) is an innovative approach towards commun...
research
08/30/2021

Thermal Management in Large Data Centers: Security Threats and Mitigation

Data centres are experiencing significant growth in their scale, especia...
research
03/23/2020

Backflash Light as a Security Vulnerability in Quantum Key Distribution Systems

Based on the fundamental rules of quantum mechanics, two communicating p...

Please sign up or login with your details

Forgot password? Click here to reset