V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network

N Lu, R Huang, M Yao, W Shi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vulnerability assessment allows cyber security professionals to discover vulnerable end
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …

[PDF][PDF] SIP vulnerability scan framework

M Alidoosti, H Asgharian, A Akbari - Journal of Information Systems and …, 2013 - Citeseer
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP
(Session Initiation Protocol) networks. We focused our studies on the detection of SIP DoS …

Vulnerability dataset construction methods applied to vulnerability detection: A survey

Y Lin, Y Li, M Gu, H Sun, Q Yue, J Hu… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
The increasing number of security vulnerabilities has become an important problem that
needs to be solved urgently in the field of software security, which means that the current …

AVAIN-a Framework for Automated Vulnerability Indication for the IoT in IP-based Networks

R Egert, T Grube, D Born… - … on Networked Systems …, 2019 - ieeexplore.ieee.org
With the rapidly increasing number of IoT-devices and their extensive integration into
people's daily lives, the security of those devices is of primary importance. To achieve early …

Modular Vulnerability Indication for the IoT in IP-Based Networks

R Egert, T Grube, D Born… - 2019 IEEE Globecom …, 2019 - ieeexplore.ieee.org
With the rapidly increasing number of Internet of Things (IoT) devices and their extensive
integration into peoples' daily lives, the security of those devices is of primary importance …

Penetration testing in a box

L Epling, B Hinkel, Y Hu - Proceedings of the 2015 information security …, 2015 - dl.acm.org
Network and application vulnerability assessments have a tendency to be difficult and costly;
however, failing to have an assessment done and fixing security loopholes may result in a …

Network monitoring and enumerating vulnerabilities in large heterogeneous networks

M Laštovička, M Husák, L Sadlek - NOMS 2020-2020 IEEE/IFIP …, 2020 - ieeexplore.ieee.org
In this paper, we present an empirical study on vulnerability enumeration in computer
networks using common network probing and monitoring tools. We conducted active …

Towards application classification with vulnerability signatures for IDS/IPS

Dhiren, Maulik, H Joshi, BK Patel - … Conference on Security of Internet of …, 2012 - dl.acm.org
In today's interconnected networks, Intrusion Detection Systems (IDSs), encryption devices
and firewalls and crucial in providing a complete security solution. A recent survey has …

Catch me if you can: An in-depth study of CVE discovery time and inconsistencies for managing risks in critical infrastructures

RJ Thomas, J Gardiner, T Chothia, E Samanis… - Proceedings of the …, 2020 - dl.acm.org
Industrial Control Systems (ICS) are central to the operation of critical national infrastructure
(CNI) such as oil and gas, water treatment, power generation and transport systems …

Vulnerability scanning

S Pandey, A Chaudhary - Authorea Preprints, 2023 - techrxiv.org
The commercial value of web applications has significantly increased in recent years. They
progressed from simple information-sharing platforms to more sophisticated business …