Jamie O'Hare
Identifying Vulnerabilities Using Internet-wide Scanning Data
O'Hare, Jamie; Macfarlane, Rich; Lo, Owen
Authors
Rich Macfarlane R.Macfarlane@napier.ac.uk
Associate Professor
Dr Owen Lo O.Lo@napier.ac.uk
Senior Research Fellow
Abstract
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provided through associated websites. The Internet-wide scanning data can be used to identify devices and services which are exposed on the Internet. It is possible to identify services as being susceptible to known- vulnerabilities by analysing the data. Analysing this information is classed as passive reconnaissance, as the target devices are not being directly communicated with. This paper goes on to define this as contactless active reconnaissance. The vulnerability identification functionality in these Internet-wide scanning tools is currently limited to a small number of high profile vulnerabilities. This work looks towards extending these features through the creation of a tool Scout which combines data from Censys and the National Vulnerability Database to passively identify potential vulnerabilities. This is possible by analysing Common Platform Enumerations and associated Common Vulnerability and Exposures. Through this novel approach, active vulnerability scanning results can be gained, while mitigating the associated issues of active scanning, such as possible disruption to the target network and devices. In initial experiments performed on 2571 services across 7 local academic intuitions, 12967 potential known-vulnerabilities were identified. More focused experiments to evaluate the results and compare accuracy with industry standard vulnerability assessment tools were carried out and Scout was found to successfully identify vulnerabilities with an effectiveness score of up to 74 percent when compared to OpenVAS.
Citation
O'Hare, J., Macfarlane, R., & Lo, O. (2019, January). Identifying Vulnerabilities Using Internet-wide Scanning Data. Presented at 12th International Conference on Global Security, Safety and Sustainability - ICGS3-19, London, United Kingdom
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 12th International Conference on Global Security, Safety and Sustainability - ICGS3-19 |
Start Date | Jan 16, 2019 |
End Date | Jan 18, 2019 |
Acceptance Date | Oct 24, 2018 |
Online Publication Date | Apr 11, 2019 |
Publication Date | 2019-05 |
Deposit Date | Apr 26, 2019 |
Publicly Available Date | May 6, 2019 |
Publisher | Institute of Electrical and Electronics Engineers |
Pages | 1-10 |
Book Title | 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) |
ISBN | 9781538670019 |
DOI | https://doi.org/10.1109/ICGS3.2019.8688018 |
Keywords | Internet-wide, computer networks, security, scout, censys, vulnerability assessment. |
Public URL | http://researchrepository.napier.ac.uk/Output/1500093 |
Contract Date | May 6, 2019 |
Files
Identifying Vulnerabilities Using Internet-wide Scanning Data
(266 Kb)
PDF
You might also like
Approaches to the classification of high entropy file fragments.
(2013)
Journal Article
Formal security policy implementations in network firewalls.
(2011)
Journal Article
Evaluation of the DFET Cloud.
(2015)
Presentation / Conference Contribution
Teaching penetration and malware analysis in a cloud-based environment.
(2015)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search