Non-intrusive techniques for vulnerability assessment of services in distributed systems

被引:3
作者
Genge, Bela [1 ]
Graur, Flavius [1 ]
Enachescu, Calin [1 ]
机构
[1] Petru Maior Univ Tg Mures, Mures 540088, Romania
来源
8TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2014 | 2015年 / 19卷
关键词
non-intrusive vulnerability assessment; shodan; National Vulnerability Database; penetration testing;
D O I
10.1016/j.protcy.2015.02.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper we propose an approach for non-intrusive, automated vulnerability assessment of services in distributed systems. Most of existing vulnerability assessment techniques rely on active testing, part of penetration-testing (pen-testing) programs, which assume a series of scanning, probing and exploitation techniques in order to identify possible system vulnerabilities. These approaches are considered highly effective in identifying possible vulnerable points in the network. However, their use is not always possible and recommended for testing on-line, mission-critical services. Therefore, this paper proposes an approach that combines the non-intrusive capabilities of Shodan tool with well-established vulnerability databases (National Vulnerability Database - NVD). The result is a comprehensive approach for non-intrusive vulnerability assessment of Internet-facing services, where hosts and services are interrogated from Shodan search engine and possible vulnerabilities and metrics are automatically extracted from National Vulnerability Database. (C) 2015 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:12 / 19
页数:8
相关论文
共 28 条
  • [1] Ammann Paul, 2002, P 9 ACM C COMP COMM, P217, DOI DOI 10.1145/586110.586140
  • [2] Beale J., 2004, NESSUS NETWORK AUDIT
  • [3] Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices
    Bodenheim, Roland
    Butts, Jonathan
    Dunlap, Stephen
    Mullins, Barry
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2014, 7 (02) : 114 - 123
  • [4] Charette R.N., 2013, IEEE Spectrum
  • [5] Evaluating the combined effect of vulnerabilities and faults on large distributed systems
    Cheminod, M.
    Bertolotti, I. Cibrario
    Durante, L.
    Sisto, R.
    Valenzano, A.
    [J]. DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 11 - +
  • [6] On the Analysis of Vulnerability Chains in Industrial Networks
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Valenzano, Adriano
    [J]. WFCS 2008: IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, : 215 - 224
  • [7] Detecting Chains of Vulnerabilities in Industrial Networks
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Maggi, Paolo
    Pozza, Davide
    Sisto, Riccardo
    Valenzano, Adriano
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (02) : 181 - 193
  • [8] Towards risk-aware communications networking
    Cholda, Piotr
    Folstad, Eirik L.
    Helvik, Bjarne E.
    Kuusela, Pirkko
    Naldi, Maurizio
    Norros, Ilkka
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2013, 109 : 160 - 174
  • [9] Department of Homeland Security and NIST, 2014, NAT VULN DAT
  • [10] Department of Homeland Security: CSET, 2014, CYB SEC EV TOOL