2010
DOI: 10.1007/978-3-642-15512-3_8
|View full text |Cite
|
Sign up to set email alerts
|

CANVuS: Context-Aware Network Vulnerability Scanning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…No breakdown of technology is given and there is little evidence of PVS being used successfully on a range of networks. Seeing as this source is provided by Tenable, the validity of the claims in this paper could be considered biased, whereas Xu et al [17] and Gonzalez and Papa [18] and Myers et al [22] clearly identify how passive technology works and give examples of live experiments. From the information provided within these sources it seems that the use of passive network sniffers over a longer period of time is the most beneficial and nonintrusive way of performing reconnaissance on SCADA systems.…”
Section: Passive Vulnerability Scanner (Pvs)mentioning
confidence: 97%
See 3 more Smart Citations
“…No breakdown of technology is given and there is little evidence of PVS being used successfully on a range of networks. Seeing as this source is provided by Tenable, the validity of the claims in this paper could be considered biased, whereas Xu et al [17] and Gonzalez and Papa [18] and Myers et al [22] clearly identify how passive technology works and give examples of live experiments. From the information provided within these sources it seems that the use of passive network sniffers over a longer period of time is the most beneficial and nonintrusive way of performing reconnaissance on SCADA systems.…”
Section: Passive Vulnerability Scanner (Pvs)mentioning
confidence: 97%
“…What is interesting within this paper is that PVS and passive scanning as a whole are associated with the "sniffing of a network, as opposed to scanning." Both Xu et al [17] and Gonzalez and Papa [18] fail to elaborate on this underlying detail. Contrary to initial expectations, Deraison and Gula [20] fail to discuss how PVS or any other passive system achieves its goals as an unobtrusive scanner.…”
Section: Passive Vulnerability Scanner (Pvs)mentioning
confidence: 99%
See 2 more Smart Citations
“…The size of enterprise networks could make vulnerability scanning prohibitively expensive [31]. Our abstraction technique provides a possible angle to address this problem.…”
Section: Related Workmentioning
confidence: 99%