D 2020

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

LAŠTOVIČKA, Martin; Martin HUSÁK and Lukáš SADLEK

Basic information

Original name

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

Authors

LAŠTOVIČKA, Martin; Martin HUSÁK and Lukáš SADLEK

Edition

Budapest, Hungary, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, p. 1-6, 6 pp. 2020

Publisher

IEEE Xplore Digital Library

Other information

Language

English

Type of outcome

Proceedings paper

Confidentiality degree

is not subject to a state or trade secret

Publication form

electronic version available online

References:

Marked to be transferred to RIV

Yes

RIV identification code

RIV/00216224:14610/20:00114801

Organization

Ústav výpočetní techniky – Repository – Repository

ISBN

978-1-7281-4973-8

EID Scopus

Keywords in English

network scanning; network monitoring; vulnerability assessment

Links

MUNI/A/1411/2019, interní kód Repo. VI20172020070, research and development project.
Changed: 17/5/2022 04:14, RNDr. Daniel Jakubík

Abstract

In the original language

In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active network scans and passive network monitoring to enumerate software resources and their version present in the network. Further, we used the data from third-party sources, such as Internet-wide scanner Shodan. We correlated the measurements with the list of recent vulnerabilities obtained from NVD using the CPE as a common identifier used in both domains. Subsequently, we compared the approaches in terms of network coverage and precision of system identification. Finally, we present a sample list of vulnerabilities observed in our campus network. Our work helps in approximating the number of vulnerabilities and vulnerable hosts in large networks, where it is often impractical or costly to perform vulnerability scans using specialized tools, and in situations, where a quick estimate is more important than thorough analysis.

Files attached