All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F20%3A00114801" target="_blank" >RIV/00216224:14610/20:00114801 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/NOMS47738.2020.9110394" target="_blank" >http://dx.doi.org/10.1109/NOMS47738.2020.9110394</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/NOMS47738.2020.9110394" target="_blank" >10.1109/NOMS47738.2020.9110394</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

  • Original language description

    In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active network scans and passive network monitoring to enumerate software resources and their version present in the network. Further, we used the data from third-party sources, such as Internet-wide scanner Shodan. We correlated the measurements with the list of recent vulnerabilities obtained from NVD using the CPE as a common identifier used in both domains. Subsequently, we compared the approaches in terms of network coverage and precision of system identification. Finally, we present a sample list of vulnerabilities observed in our campus network. Our work helps in approximating the number of vulnerabilities and vulnerable hosts in large networks, where it is often impractical or costly to perform vulnerability scans using specialized tools, and in situations, where a quick estimate is more important than thorough analysis.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

    <a href="/en/project/VI20172020070" target="_blank" >VI20172020070: Research of Tools for Cyber Situational Awareness and Decision Support of CSIRT Teams in Protection of Critical Infrastructure</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium

  • ISBN

    9781728149738

  • ISSN

  • e-ISSN

    2374-9709

  • Number of pages

    6

  • Pages from-to

    1-6

  • Publisher name

    IEEE Xplore Digital Library

  • Place of publication

    Budapest, Hungary

  • Event location

    Budapest

  • Event date

    Jan 1, 2020

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000716920500118