Optimizing Automated Vulnerability Assessments of Remote Information Systems

Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such...

Full description

Bibliographic Details
Main Authors: Evgeniy Petrovich Tumoyan, Daria Alexandrovna Kavchuk
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2013-02-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/351