Optimizing Automated Vulnerability Assessments of Remote Information Systems

Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such...

Full description

Bibliographic Details
Main Authors: Evgeniy Petrovich Tumoyan, Daria Alexandrovna Kavchuk
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2013-02-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/351
_version_ 1797716530140545024
author Evgeniy Petrovich Tumoyan
Daria Alexandrovna Kavchuk
author_facet Evgeniy Petrovich Tumoyan
Daria Alexandrovna Kavchuk
author_sort Evgeniy Petrovich Tumoyan
collection DOAJ
description Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such as service, target operating system, exploit rank. The validation process takes plenty of time due to that. The aim of this work is to develop the method and program system of automatic vulnerability validation.
first_indexed 2024-03-12T08:22:49Z
format Article
id doaj.art-84606a7fc7c744769f2ca724b943fce3
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T08:22:49Z
publishDate 2013-02-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-84606a7fc7c744769f2ca724b943fce32023-09-02T18:20:47ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362013-02-012012530343Optimizing Automated Vulnerability Assessments of Remote Information SystemsEvgeniy Petrovich Tumoyan0Daria Alexandrovna Kavchuk1Taganrog Institute of Technology, Southern Federal UniversityTaganrog Institute of Technology, Southern Federal UniversityUp-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such as service, target operating system, exploit rank. The validation process takes plenty of time due to that. The aim of this work is to develop the method and program system of automatic vulnerability validation.https://bit.mephi.ru/index.php/bit/article/view/351vulnerability exploitationattack treeartificial neural network
spellingShingle Evgeniy Petrovich Tumoyan
Daria Alexandrovna Kavchuk
Optimizing Automated Vulnerability Assessments of Remote Information Systems
Безопасность информационных технологий
vulnerability exploitation
attack tree
artificial neural network
title Optimizing Automated Vulnerability Assessments of Remote Information Systems
title_full Optimizing Automated Vulnerability Assessments of Remote Information Systems
title_fullStr Optimizing Automated Vulnerability Assessments of Remote Information Systems
title_full_unstemmed Optimizing Automated Vulnerability Assessments of Remote Information Systems
title_short Optimizing Automated Vulnerability Assessments of Remote Information Systems
title_sort optimizing automated vulnerability assessments of remote information systems
topic vulnerability exploitation
attack tree
artificial neural network
url https://bit.mephi.ru/index.php/bit/article/view/351
work_keys_str_mv AT evgeniypetrovichtumoyan optimizingautomatedvulnerabilityassessmentsofremoteinformationsystems
AT dariaalexandrovnakavchuk optimizingautomatedvulnerabilityassessmentsofremoteinformationsystems