Calcium Vulnerability Scanner (CVS): A Deeper Look

11/03/2019
by   Sari Sultan, et al.
0

Traditional vulnerability scanning methods are time-consuming and indecisive, and they negatively affect network performance by generating high network traffic. In this paper, we present a novel vulnerability scanner that is time-efficient, simple, accurate, and safe. We call it a Calcium Vulnerability Scanner (CVS). Our contribution to vulnerability scanning are the following: (i) minimize its required time and network traffic: compared to current technologies, we reduced the former by an average of 79 99.9 improved this by an average of 2600 from previous scans in order to reduce future scanning time and enhance accuracy: compared to current technologies, CVS reduced scanning time by an average of 97 for scalable and efficient deployment of such tools in large-scale networks, containers, edge computing, and cloud computing.

READ FULL TEXT

page 7

page 9

research
02/12/2019

Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment

Edge computing is providing higher class intelligent service and computi...
research
01/11/2021

Understanding the Quality of Container Security Vulnerability Detection Tools

Virtualization enables information and communications technology industr...
research
08/12/2019

Identifying and characterizing ZMap scans: a cryptanalytic approach

Network scanning tools play a major role in Internet security. They are ...
research
11/09/2009

A Dynamic Vulnerability Map to Assess the Risk of Road Network Traffic Utilization

Le Havre agglomeration (CODAH) includes 16 establishments classified Sev...
research
07/16/2023

Measurement-Driven Design and Runtime Optimization in Edge Computing: Methodology and Tools

Edge computing is projected to become the dominant form of cloud computi...
research
07/06/2022

Multi-Target Search in Euclidean Space with Ray Shooting (Full Version)

The Euclidean shortest path problem (ESPP) is a well studied problem wit...
research
04/08/2019

Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

Owing to a growing number of attacks, the assessment of Industrial Contr...

Please sign up or login with your details

Forgot password? Click here to reset