2015
DOI: 10.1002/sec.1262
|View full text |Cite
|
Sign up to set email alerts
|

ShoVAT: Shodan‐based vulnerability assessment tool for Internet‐facing services

Abstract: Shodan has been acknowledged as one of the most popular search engines available today, designed to crawl the Internet and to index discovered services. This paper expands the features exposed by Shodan with advanced vulnerability assessment capabilities embedded into a novel tool called Shodan‐based vulnerability assessment tool (ShoVAT). ShoVAT takes the output of traditional Shodan queries and performs an in‐depth analysis of service‐specific data, that is, service banners. It embodies specially crafted alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(39 citation statements)
references
References 15 publications
0
39
0
Order By: Relevance
“…There are diverse algorithms ranging from simple keyword matching to similarity analysis. To detect vulnerabilities like Heartbleed and Poodle, Shodan and Censys find the OpenSSL version information from the collected traffic and match it with the relevant vulnerability information for analysis [17][18].…”
Section: Technology For Analyzing Security Vulnerability Informationmentioning
confidence: 99%
“…There are diverse algorithms ranging from simple keyword matching to similarity analysis. To detect vulnerabilities like Heartbleed and Poodle, Shodan and Censys find the OpenSSL version information from the collected traffic and match it with the relevant vulnerability information for analysis [17][18].…”
Section: Technology For Analyzing Security Vulnerability Informationmentioning
confidence: 99%
“…Shovat [21] is a passive vulnerability analysis tool developed by Petru Maior University in Romania with the Shodan engine. Shovat takes the output of traditional Shodan queries and performs an in-depth analysis of service-specific data, such as service banners.…”
Section: Preliminary Research Related To Internet-wide Scanningmentioning
confidence: 99%
“…6, this results in significant changes of routing decisions in the two domains. To start with, flows 2, 7, 12 are migrated to Link9, flow 6 is migrated to Link10, while flows 1, 3,8,9,11 are migrated to Link11. Next, we create two disturbances in the network topology.…”
Section: B Multi-domain Scenariomentioning
confidence: 99%
“…This will provide the building blocks for novel infrastructural paradigms, and will facilitate innovative applications such as robust voltage control, renewable energy programs, and electric vehicles. Despite these clear advantages, however, the pervasive integration of commodity off the shelf ICT hardware and software will also expose ICS to new threats [1], [2], [3]. These may have a significant impact on the functioning of critical infrastructures, e.g., the power grid, and may lead to the failure of services, to economic and, possibly, to human losses.…”
Section: Introductionmentioning
confidence: 99%