Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analyzing Threat Perception and Geo-Location of Internet-Facing Systems


Affiliations
1 ISERC, Visva-Bharati University, Santiniketan, West Bengal, India
     

   Subscribe/Renew Journal


For understanding security, it is vital to know about the perception of threat. Hence, to analyze the security of information systems, we must be aware about the exposure of different systems as well as the tools available with an attacker to attack the system.

In this paper, the research focused on gaining information about Cyber-security vulnerabilities, detecting vulnerable systems using known methods and then geo-location of systems for the visualization of the same. Three cases were studied to cover different type of systems so that it can be extrapolated from there on for generalization of the process of obtaining potentially vulnerable systems using this methodology suggested.

We were successful in obtaining the list of potentially vulnerable systems and also estimated the ability of the tools used i.e. SHODAN and IP to geo-location websites and could conclude that these tools possess the potential of reducing the resources required to exploit a system, but, are vital to aid the defenders in identifying vulnerable systems.


Keywords

Cyber-Security, Information-Security, Vulnerability, Geo-location
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 494

PDF Views: 0




  • Analyzing Threat Perception and Geo-Location of Internet-Facing Systems

Abstract Views: 494  |  PDF Views: 0

Authors

Pawandeep Singh
ISERC, Visva-Bharati University, Santiniketan, West Bengal, India

Abstract


For understanding security, it is vital to know about the perception of threat. Hence, to analyze the security of information systems, we must be aware about the exposure of different systems as well as the tools available with an attacker to attack the system.

In this paper, the research focused on gaining information about Cyber-security vulnerabilities, detecting vulnerable systems using known methods and then geo-location of systems for the visualization of the same. Three cases were studied to cover different type of systems so that it can be extrapolated from there on for generalization of the process of obtaining potentially vulnerable systems using this methodology suggested.

We were successful in obtaining the list of potentially vulnerable systems and also estimated the ability of the tools used i.e. SHODAN and IP to geo-location websites and could conclude that these tools possess the potential of reducing the resources required to exploit a system, but, are vital to aid the defenders in identifying vulnerable systems.


Keywords


Cyber-Security, Information-Security, Vulnerability, Geo-location