1. – Student, Iserc, Visva-bharati University, Santiniketan, West Bengal, India
| Received
14-Mar-2014 |
Accepted
- |
Published
14-Mar-2014 |
Abstract
For understanding security, it is vital to know about the
perception of threat. Hence, to analyze the security
of information systems, we must be aware about the
exposure of different systems as well as the tools
available with an attacker to attack the system.
In this paper, the research focused on gaining
information about Cyber-security vulnerabilities,
detecting vulnerable systems using known methods
and then geo-location of systems for the visualization of
the same. Three cases were studied to cover different
type of systems so that it can be extrapolated from
there on for generalization of the process of obtaining
potentially vulnerable systems using this methodology
suggested.
We were successful in obtaining the list of potentially
vulnerable systems and also estimated the ability of
the tools used i.e. SHODAN and IP to geo-location
websites and could conclude that these tools possess
the potential of reducing the resources required to
exploit a system, but, are vital to aid the defenders in
identifying vulnerable systems.
Locked
Subscribed
Open Access
Open Access