Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/8610
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ecik, Harun | - |
dc.date.accessioned | 2022-07-30T16:41:55Z | - |
dc.date.available | 2022-07-30T16:41:55Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Ecik, H. (2021, December). Comparison of Active Vulnerability Scanning vs. Passive Vulnerability Detection. In 2021 International Conference on Information Security and Cryptology (ISCTURKEY) (pp. 87-92). IEEE. | en_US |
dc.identifier.isbn | 9781665407762 | - |
dc.identifier.uri | https://doi.org/10.1109/ISCTURKEY53027.2021.9654331 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/8610 | - |
dc.description | 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 -- 2 December 2021 through 3 December 2021 -- -- 175906 | en_US |
dc.description.abstract | Vulnerability analysis is an integral part of an overall security program. Through identifying known security flaws and weaknesses, vulnerability identification tools help security practitioners to remediate the existing vulnerabilities on the networks. Thus, it is crucial that the results of such tools are complete, accurate, timely and they produce vulnerability results with minimum or no side-effects on the networks. To achieve these goals, Active Vulnerability Scanning (AVS) or Passive Vulnerability Detection (PVD) approaches can be used by network-based vulnerability scanners. In this work, we evaluate these two approaches with respect to efficiency and effectiveness. For the effectiveness analysis, we compare these two approaches empirically on a test environment and evaluate their outcomes. According to total amount of accuracy and precision, the PVD results are higher than AVS. As a result of our analysis, we conclude that PVD returns more complete and accurate results with considerably shorter scanning periods and with no side-effects on networks, compared to the AVS. © 2021 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | active vulnerability scanning | en_US |
dc.subject | passive vulnerability detection | en_US |
dc.subject | Network security | en_US |
dc.subject | Active vulnerability scanning | en_US |
dc.subject | Identification tools | en_US |
dc.subject | Integral part | en_US |
dc.subject | Passive vulnerability detection | en_US |
dc.subject | Security flaws | en_US |
dc.subject | Security programs | en_US |
dc.subject | Security weakness | en_US |
dc.subject | Side effect | en_US |
dc.subject | Vulnerability analysis | en_US |
dc.subject | Vulnerability detection | en_US |
dc.subject | Scanning | en_US |
dc.title | Comparison of Active Vulnerability Scanning Vs. Passive Vulnerability Detection | en_US |
dc.type | Conference Object | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.identifier.startpage | 87 | en_US |
dc.identifier.endpage | 92 | en_US |
dc.identifier.scopus | 2-s2.0-85124406887 | en_US |
dc.institutionauthor | Ecik, Harun | - |
dc.identifier.doi | 10.1109/ISCTURKEY53027.2021.9654331 | - |
dc.authorscopusid | 57447540100 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - İdari Personel ve Öğrenci | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.