Optimizing Automated Vulnerability Assessments of Remote Information Systems
Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2013-02-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/351 |
_version_ | 1797716530140545024 |
---|---|
author | Evgeniy Petrovich Tumoyan Daria Alexandrovna Kavchuk |
author_facet | Evgeniy Petrovich Tumoyan Daria Alexandrovna Kavchuk |
author_sort | Evgeniy Petrovich Tumoyan |
collection | DOAJ |
description | Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such as service, target operating system, exploit rank. The validation process takes plenty of time due to that. The aim of this work is to develop the method and program system of automatic vulnerability validation. |
first_indexed | 2024-03-12T08:22:49Z |
format | Article |
id | doaj.art-84606a7fc7c744769f2ca724b943fce3 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T08:22:49Z |
publishDate | 2013-02-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-84606a7fc7c744769f2ca724b943fce32023-09-02T18:20:47ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362013-02-012012530343Optimizing Automated Vulnerability Assessments of Remote Information SystemsEvgeniy Petrovich Tumoyan0Daria Alexandrovna Kavchuk1Taganrog Institute of Technology, Southern Federal UniversityTaganrog Institute of Technology, Southern Federal UniversityUp-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such as service, target operating system, exploit rank. The validation process takes plenty of time due to that. The aim of this work is to develop the method and program system of automatic vulnerability validation.https://bit.mephi.ru/index.php/bit/article/view/351vulnerability exploitationattack treeartificial neural network |
spellingShingle | Evgeniy Petrovich Tumoyan Daria Alexandrovna Kavchuk Optimizing Automated Vulnerability Assessments of Remote Information Systems Безопасность информационных технологий vulnerability exploitation attack tree artificial neural network |
title | Optimizing Automated Vulnerability Assessments of Remote Information Systems |
title_full | Optimizing Automated Vulnerability Assessments of Remote Information Systems |
title_fullStr | Optimizing Automated Vulnerability Assessments of Remote Information Systems |
title_full_unstemmed | Optimizing Automated Vulnerability Assessments of Remote Information Systems |
title_short | Optimizing Automated Vulnerability Assessments of Remote Information Systems |
title_sort | optimizing automated vulnerability assessments of remote information systems |
topic | vulnerability exploitation attack tree artificial neural network |
url | https://bit.mephi.ru/index.php/bit/article/view/351 |
work_keys_str_mv | AT evgeniypetrovichtumoyan optimizingautomatedvulnerabilityassessmentsofremoteinformationsystems AT dariaalexandrovnakavchuk optimizingautomatedvulnerabilityassessmentsofremoteinformationsystems |