Home > Publications
Home University of Twente
Prospective Students
Intranet (internal)

EEMCS EPrints Service

12034 Vulnerability management tools for COTS software - A comparison
Home Policy Brochure Browse Search User Area Contact Help

Welberg, S.M. (2008) Vulnerability management tools for COTS software - A comparison. Technical Report TR-CTIT-08-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Full text available as:


266 Kb
Open Access

Exported to Metis


In this paper, we compare vulnerability management tools in two stages. In the first stage, we perform a global comparison involving thirty tools available in the market. A framework composed of several criteria based on scope and analysis is used for this comparison. From this global view of the tools, we detected that only three tools perform correlated analysis. Correlated analysis can be done in two ways: (i) correlation of scanning results with the output from other security devices such as firewall and intrusion detection systems, or (ii) correlation between vulnerabilities composing attack scenarios. Although both correlations add value to vulnerability management, the latter is especially important to unveil stepping stones which could be exploited by attackers. The comparison shows that two out of three tools perform correlation of the second type but scalability and the amount of manual input required seems to be their biggest problems.

Item Type:Internal Report (Technical Report)
Research Group:EWI-IS: Information Systems
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Research Project:IPID: Integrated Policy-based Intrusion Detection
ID Code:12034
Deposited On:04 March 2008
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item