NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110394
|View full text |Cite
|
Sign up to set email alerts
|

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

Abstract: In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active network scans and passive network monitoring to enumerate software resources and their version present in the network. Further, we used the data from third-party sources, such as Internet-wide scanner Shodan. We correlated the measurements with the list of recent vulnerabilities obtained from NVD using the CPE as a common identifier used in both d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 13 publications
1
17
0
Order By: Relevance
“…This design based on multiple agents is scalable to allow the incorporation of other protocols in the collection and analysis of the data to convert it into information or present it in the form of a report or graphical interface. It can be used at the level of energy consumption calculation, in a similar way as those presented in the literature (Laštovička et al, 2020;Jin et al, 2019;Allahham and Rahman, 2018), with the great difference of reducing the number of sensors required, that is, the hardware component is reduced through the estimation of energy levels based on theoretical models, and some agent of the developed system is in charge of computing them.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This design based on multiple agents is scalable to allow the incorporation of other protocols in the collection and analysis of the data to convert it into information or present it in the form of a report or graphical interface. It can be used at the level of energy consumption calculation, in a similar way as those presented in the literature (Laštovička et al, 2020;Jin et al, 2019;Allahham and Rahman, 2018), with the great difference of reducing the number of sensors required, that is, the hardware component is reduced through the estimation of energy levels based on theoretical models, and some agent of the developed system is in charge of computing them.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, network monitoring has evolved into the field of cybersecurity as a monitoring system on a campus and industry infrastructure to identify and mitigate potential vulnerabilities (Laštovička et al, 2020), in addition to analyzing the network flow with recurring neural networks (Yang et al, 2020), wireless analysis (Jin et al, 2019;Allahham and Rahman, 2018), or risk assessment (Awang et al, 2020).…”
Section: Related Workmentioning
confidence: 99%
“…OS fingerprinting captures network connection properties, such as TCP window size and Time to Live (TTL), to infer the device's operating system. Passive OS fingerprinting from IP flow was used by Laštovička et al [23] to enumerate vulnerabilities in large networks.…”
Section: State Of the Artmentioning
confidence: 99%
“…Vulnerability Discovery Precision: Another issue of vulnerability discovery is a lot of false positives. Methods that have extensive coverage (e.g., based on OS fingerprinting) can be imprecise or will not reveal sufficient details [23]. It causes employees to spend much time validating vulnerabilities [14], e.g., using vulnerability scanners that can use automated vulnerability exploits to confirm true positives.…”
Section: Challengesmentioning
confidence: 99%
See 1 more Smart Citation