The method of optimizing the automatic vulnerability validation

  • Authors:
  • Eugene Tumoyan;Daria Kavchuk

  • Affiliations:
  • Southern Federal University, Taganrog, Russia;Southern Federal University, Taganrog, Russia

  • Venue:
  • Proceedings of the Fifth International Conference on Security of Information and Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such as service, target operating system, exploit rank. Due to that the validation process takes plenty of time. The aim of this work is to develop the method and program system of automatic vulnerability validation.