Skip to main content

Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms

  • Conference paper
Fuzzy Systems and Knowledge Discovery (FSKD 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4223))

Included in the following conference series:

Abstract

Because of worms which make use of vulnerability of computer systems, computer incidents are increasing. Although there is an opportunity to defend these attacks at an earlier stage, people undergo several serious disturbances because many administrators and users didn’t realize the gravity of the patch management, that is, the patch management system (PMS) prevents the intrusion. Prevention with "Prevention is better than cure." is very important. Therefore we need installing an effective patch management system. We designed and implemented the proposed framework which provides solutions for managing and distributing critical patches that resolve known security vulnerabilities and other stability issues with various platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lemos, R.: Microsoft publishes program to blast MSBlast, CNET News. com (January 6, 2004)

    Google Scholar 

  2. Lemos, R.: Hacker code could unleash Windows worm, CNET News. com (July 25, 2003)

    Google Scholar 

  3. Symantec Internet Security Threat Report vol. V, Symantec Corporation (March 2004)

    Google Scholar 

  4. CERT/Coordination Center : CERT Advisory, www.cert.org/advisories/CA-2001-26.html

  5. Microsoft Corporation: Microsoft Security Bulletin, www.microsoft.com/technet/security/bulletin/ms00-078.mspx

  6. Bashar, M.A., Krishnan, G., Kuhn, M.G.: Low-threat security patches and tools. In: Proceedings of the International Conference on Software Maintenance (1997)

    Google Scholar 

  7. PatchLink Corporation, http://www.patchlink.com

  8. Ecora Software Corporation, http://www.ecora.com

  9. BigFix, Inc, http://www.bigfix.com

  10. Security Profiling, http://www.securityprofiling.com

  11. St. Bernard Software, http://www.stbernard.com

  12. GFI, ww.gfi.com

  13. Gravity Storm Software, http://www.securitybastion.com

  14. Shavlik, http://www.shavlik.com

  15. SoftRun, http://www.softrun.com

  16. Microsoft SUS, www.microsoft.com/windowsserversystem/sus/default.mspx

  17. Seo, J.T., Yoon, J.B., Choi, D.S., Park, E.K., Sohn, T.S., Moon, J.S.: A study on the Patch Management Syste. In: Intranet, PACO 2004 (2004)

    Google Scholar 

  18. Seo, J.T., Choi, D.S., Park, E.K., Shon, T.S., Moon, J.S.: Patch Management System for Multiplatform Environment. In: PDCAT 2004 (2004)

    Google Scholar 

  19. Sohn, T.S., Moon, J.S., Seo, J.T., Im, E.K., Lee, C.W.: Safe Patch Distribution Architecture in Intranet Environments. In: SAM 2003 (2003)

    Google Scholar 

  20. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21, 993–999 (1978)

    Article  MATH  Google Scholar 

  21. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  22. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seo, JT., Kim, Yj., Park, EK., Lee, Sw., Shon, T., Moon, J. (2006). Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. In: Wang, L., Jiao, L., Shi, G., Li, X., Liu, J. (eds) Fuzzy Systems and Knowledge Discovery. FSKD 2006. Lecture Notes in Computer Science(), vol 4223. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881599_87

Download citation

  • DOI: https://doi.org/10.1007/11881599_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45916-3

  • Online ISBN: 978-3-540-45917-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics