An Analysis on Host Vulnerability Evaluation of Modern Operating Systems

Abstract

Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities and attacks effectively. In this paper, our contribution is twofold. Firstly, we critically analyze the host vulnerabilities in modern desktop OSs. We group existing approaches and provide an easy and concise view of different security models adapted by most widely used OSs. The comparison of several OSs regarding structure, architecture, mode of working, and security models also form part of the paper. Secondly, we use the current usage statistics for Windows, Linux, and MAC OSs and predict their future. Our forecast will help the designers, developers and users of the different OSs to prepare for the upcoming years accordingly.

Authors and Affiliations

Afifa Sajid, Munam Shah, Muhammad Kamran, Qaisar Javaid, Sijing Zhang

Keywords

Related Articles

PSIM and MATLAB Co-Simulation of Photovoltaic System using “P and O” and “Incremental Conductance” MPPT

The photovoltaic (PV) generator shows a nonlinear current-voltage (I-V) characteristic that its maximum power point (MPP) differs with irradiance and temperature. by employing simple maximum power point tracking algorith...

Detection of Distributed Denial of Service Attacks Using Artificial Neural Networks

Distributed Denial of Services (DDoS) is a ruthless attack that targets a node or a medium with its false packets to decline the network performance and its resources. Neural networks is a powerful tool to defend a netwo...

Adaptive Generalized Gaussian Distribution Oriented Thresholding Function for Image De-Noising

In this paper, an Adaptive Generalized Gaussian Distribution (AGGD) oriented thresholding function for image de-noising is proposed. This technique utilizes a unique threshold function derived from the generalized Gaussi...

Automatic Ferrite Content Measurement based on Image Analysis and Pattern Classification

The existing manual point counting technique for ferrite content measurement is a difficult time consuming method which has limited accuracy due to limited human perception and error induced by points on boundaries of gr...

Comprehensive Centralized-Data Warehouse for Managing Malaria Cases

Tanah Bumbu is one of the most endemic areas in Indonesia for patients diagnosed with malaria diseases. Currently, available malaria case data were stored in disparate sources. Hence, it is difficult for the public healt...

Download PDF file
  • EP ID EP149087
  • DOI 10.14569/IJACSA.2016.070430
  • Views 92
  • Downloads 0

How To Cite

Afifa Sajid, Munam Shah, Muhammad Kamran, Qaisar Javaid, Sijing Zhang (2016). An Analysis on Host Vulnerability Evaluation of Modern Operating Systems. International Journal of Advanced Computer Science & Applications, 7(4), 245-254. https://europub.co.uk/articles/-A-149087