D 2020

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

LAŠTOVIČKA, Martin; Martin HUSÁK a Lukáš SADLEK

Základní údaje

Originální název

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

Autoři

LAŠTOVIČKA, Martin; Martin HUSÁK a Lukáš SADLEK

Vydání

Budapest, Hungary, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, od s. 1-6, 6 s. 2020

Nakladatel

IEEE Xplore Digital Library

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Odkazy

Označené pro přenos do RIV

Ano

Kód RIV

RIV/00216224:14610/20:00114801

Organizace

Ústav výpočetní techniky – Masarykova univerzita – Repozitář

ISBN

978-1-7281-4973-8

EID Scopus

Klíčová slova anglicky

network scanning; network monitoring; vulnerability assessment

Návaznosti

MUNI/A/1411/2019, interní kód Repo. VI20172020070, projekt VaV.
Změněno: 17. 5. 2022 04:14, RNDr. Daniel Jakubík

Anotace

V originále

In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active network scans and passive network monitoring to enumerate software resources and their version present in the network. Further, we used the data from third-party sources, such as Internet-wide scanner Shodan. We correlated the measurements with the list of recent vulnerabilities obtained from NVD using the CPE as a common identifier used in both domains. Subsequently, we compared the approaches in terms of network coverage and precision of system identification. Finally, we present a sample list of vulnerabilities observed in our campus network. Our work helps in approximating the number of vulnerabilities and vulnerable hosts in large networks, where it is often impractical or costly to perform vulnerability scans using specialized tools, and in situations, where a quick estimate is more important than thorough analysis.

Přiložené soubory