ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services

نویسندگان

  • Béla Genge
  • Calin Enachescu
چکیده

Shodan has been acknowledged as one of the most popular search engines available today, designed to crawl the Internet and to index discovered services. This paper expands the features exposed by Shodan with advanced vulnerability assessment capabilities embedded into a novel tool called ShoVAT. ShoVAT takes the output of traditional Shodan queries and performs an in-depth analysis of service-specific data, i.e., service banners. It embodies specially crafted algorithms which rely on novel in-memory data structures to automatically reconstruct Common Platform Enumeration (CPE) names and to proficiently extract vulnerabilities from National Vulnerability Database (NVD). Compared to the state-of-the-art, ShoVAT brings several novel and significant contributions, since it encompasses automated vulnerability identification techniques, it can return highly accurate results with customized and even purposefully modified service banners, and it supports historical service vulnerability analysis without the need to deploy additional monitoring infrastructures. Experiments performed on 1501 services in twelve different institutions across different sectors revealed high accuracy of results and a total of 3922 known vulnerabilities. This is the accepted version of the following article: B. Genge and C. Enăchescu: ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. Security and communication networks, Wiley, 2015, DOI: DOI: 10.1002/sec.1262, available online here: http://onlinelibrary.wiley.com/doi/10.1002/sec.1262/abstract. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 00:1–18

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Beyond Internet Scanning: Banner Processing for Passive Software Vulnerability Assessment

Nowadays, the increasing number of devices and services that require a direct Internet access, creates new security challenges. These challenges need to meet user feature-based requirements with the companies’ restrictive security policies. Therefore, security administrators need to adopt novel tools in order to quickly and non-intrusively verify the degree of exposure of Internet-facing servic...

متن کامل

Contactless Vulnerability Analysis using Google and Shodan

The increasing number of attacks on internet-based systems calls for security measures on behalf those systems’ operators. Beside classical methods and tools for penetration testing, there exist additional approaches using publicly available search engines. We present an alternative approach using contactless vulnerability analysis with both classical and subject-specific search engines. Based ...

متن کامل

New Tool And Technique For Remote Operating System Fingerprinting

Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In this context, host Operating System detection must be precise, even when networks are well defended. We present an original Operating System detection method, based on temporal response analysis. As a proof of concept, we release the open source tool called RING – for...

متن کامل

Internet-wide Scanning Taxonomy and Framework

Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Ma...

متن کامل

ICS Threat Analysis Using a Large-Scale Honeynet

A cyber security strategy for Industrial Control Systems (ICS) is typically based on the identified threats to a system. In order to obtain a better insight into the ICS-related threat landscape, we have deployed a largescale, low-interaction honeypot system on the Internet and have analysed the interactions observed during 28-day long experiments. We describe the interaction results for a vari...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2016