International Journal of Electrical and Computer Engineering (IJECE) Vol. 13, No. 1, February 2023, pp. 561~570 ISSN: 2088-8708, DOI: 10.11591/ijece.v13i1.pp561-570 561 Journal homepage: http://ijece.iaescore.com Response time optimization for vulnerability management system by combining the benchmarking and scenario planning models Arif Basuki, Andi Adriansyah Department of Electrical Engineering, Universitas Mercu Buana, Jakarta, Indonesia Article Info ABSTRACT Article history: Received Oct 27, 2021 Revised Sep 1, 2022 Accepted Sep 22, 2022 The growth of information and communication technology has made the internet network have many users. On the other side, this increases cybercrime and its risks. One of the main attack targets is network weakness. Therefore, cyber security is required, which first does a network scan to stop the attack. Points of vulnerability on the network can be discovered using scanning techniques. Furthermore, mitigation or recovery measures can be implemented. However, it needs a short response time and high accuracy while scanning to reduce the level of damage caused by cyber-attacks. In this paper, the proposed method improves the performance of a vulnerability management system based on network and port scanning by combining the benchmarking and scenario planning models. On a network scanning to discover open ports on a subnet, Masscan can achieve response times of less than 2 seconds, and on scenario planning for detection on a single host by Nmap can reach less than 4 seconds. It was combining both models obtained an adequate optimization response time. The total response time is less than 6 seconds. Keywords: Network Port scanning Vulnerability This is an open access article under the CC BY-SA license. Corresponding Author: Andi Adriansyah Department of Electrical Engineering, Universitas Mercu Buana St. Meruya Selatan, Kembangan, Jakarta 11650, Indonesia Email: andi@mercubuana.ac.id 1. INTRODUCTION The more connected people are to one another, the easier it is to connect to the internet. As a result, the growth of cybercrime and its associated risks have increased. Cybersecurity breaches have resulted in several incidents such as exposure of personal information, theft of credit cards, loss of medical records, corporate hacking, and attacks on government [1][4]. The internet is a computer network system that connects all devices worldwide. Almost all human and machine activities can be served via the internet, and many devices, such as smartphones, computers, sensors, and so on, are connected to this network. As a result, internet users have increased dramatically [5], [6]. In addition, cybersecurity is an action to stop or restrict other parties from entering the network. Therefore, cyber security is closely related to the risk management process. Protecting assets in the form of a network by managing vulnerabilities can become threats that pose risks. Furthermore, security measures are taken to effectively overcome the hazards to control the system [1]. Therefore, vulnerability is a vital aspect of risk management. The action to discover network vulnerability points is to perform a scan. This scanning technique looks for vulnerabilities in terminals massively by performing a comprehensive port scan of problem areas [7], [8]. While a network is scanning, port discovery accuracy and scan response times are variables of the performance of this technique. Therefore, cybersecurity is urgent to protect immediately by cybersecurity, especially when an attack has occurred. However, before