Process Models for Intrusion Detection Summary - CSU1288 - Shoolini U

Summary of Vulnerability Analysis: Credentialed and Non-Credentialed

1. What is Vulnerability Analysis?

2. Credentialed Vulnerability Analysis

Benefits

  1. Deeper Scanning: Access to internal details.
  2. Higher Accuracy: Fewer false positives.
  3. Improved Detection: Finds hidden issues.
  4. Better Prioritization: Based on real configurations.

Limitations

  1. Credential Management Risks
  2. Restricted Access If Inadequate Permissions
  3. Performance Load
  4. Risk of Credential Misuse

3. Non-Credentialed Vulnerability Analysis

Benefits

  1. Simulates Real-World Attack Scenarios
  2. Less Intrusive
  3. Easier Deployment

Limitations

  1. Superficial Results
  2. Misses Internal Threats
  3. Higher False Positives
  4. Lower Accuracy

4. Comparison Table

Criteria Credentialed Non-Credentialed
Scope Internal + external External-facing only
Access Requires credentials No credentials
Internal Detection High Low
Performance Impact Potential system load Minimal
False Positives Lower Higher
Ease of Deployment Complex Simple

5. Use Cases

Use Credentialed When:

Use Non-Credentialed When:

6. Hybrid Vulnerability Scanning

7. Common Vulnerability Scanning Tools

  1. Nessus – Enterprise-grade, both scan types.
  2. OpenVAS – Open-source, flexible scanning.
  3. QualysGuard – Commercial, internal and external scanning.
  4. Rapid7 Nexpose – Integrated with monitoring tools.

8. Best Practices

Credentialed Scanning

Non-Credentialed Scanning

9. Challenges

  1. False Positives/Negatives
  2. High Resource Usage
  3. Advanced Evasion Techniques by attackers