Ferret: A host vulnerability checking tool

Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classified based on their location as application vulnerabilities, network vulnerabilities, or host vulnerabilities. This paper describes Ferret, a new software tool for checking host vulnerabilities. Ferret helps system administrators by quickly finding vulnerabilities that are present on a host. It is designed and implemented in a modular way: a different plug-in module is used for each vulnerability checked, and each possible output format is specified by a plug-in module. As a result, Ferret is extensible, and can easily be kept up-to-date through addition of checks for new vulnerabilities as they are discovered; the modular approach also makes it easy to provide specific configurations of Ferret tailored to specific operating systems or use environments. Ferret is a freely available open-source software implemented in Perl.

Original languageEnglish (US)
Title of host publicationProceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing
Pages389-394
Number of pages6
DOIs
StatePublished - 2004
EventProceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing - Papeete Tahiti, French Polynesia
Duration: Mar 3 2004Mar 5 2004

Publication series

NameProceedings - IEEE Pacific Rim International Symposium on Dependable Computing

Other

OtherProceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing
CountryFrench Polynesia
CityPapeete Tahiti
Period3/3/043/5/04

Keywords

  • Host vulnerabilities
  • Security auditing tool
  • Security evaluation

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Ferret: A host vulnerability checking tool'. Together they form a unique fingerprint.

Cite this