z-logo
open-access-imgOpen Access
Vulnerability and risk assessment for operating system (OS) with framework STRIDE: comparison between VulnOS and Vulnix
Author(s) -
Adityas Widjajarto,
Muharman Lubis,
Vreseliana Ayuningtyas
Publication year - 2021
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v23.i3.pp1643-1653
Subject(s) - spoofing attack , vulnerability (computing) , computer security , denial of service attack , vulnerability assessment , stride , computer science , honeypot , service (business) , denial , sample (material) , business , world wide web , psychology , the internet , marketing , psychological resilience , psychoanalysis , psychotherapist , chemistry , chromatography
The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here