• Corpus ID: 7561947

VmiCVS : Cloud Vulnerability Scanner

@inproceedings{Krishna2016VmiCVSC,
  title={VmiCVS : Cloud Vulnerability Scanner},
  author={Anil Krishna and Robert Ricci},
  year={2016}
}
Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners use methods that an attacker uses to attack in order to expose the vulnerabilities. As a result… 

Figures and Tables from this paper

Failure-Aware Application Placement Modeling and Optimization in High Turnover DevOps Environment

This paper proposes proactive application placement algorithms with prediction of infrastructure failures, and builds stochastic models for application turnover and infrastructure failure processes, and provides various types of Failure-Index.

References

SHOWING 1-10 OF 15 REFERENCES

A quantitative evaluation of vulnerability scanning

The data collected in this study show that authenticated vulnerability scanning is usable, however, automated scanning is not able to accurately identify all vulnerabilities present in computer networks.

2009 Data Breach Investigations Report

This year's DBIR shows that the majority of data security incidents can be classified into one of nine patterns, and physical theft and loss made up the largest share of all incidents in healthcare, at 32% of the total.

Library Interface Versioning in Solaris and Linux

The library symbol-versioning technology in Linux and Solaris is described, the ways in which it is used to support upward compatibility for existing compiled applications from one release of Solaris to the next, and the potential for similar mechanisms to be applied in Linux versioned shared libraries.

Vulnerability assessment wiki. https: //en.wikipedia.org/wiki/Vulnerability assessment

  • Vulnerability assessment wiki. https: //en.wikipedia.org/wiki/Vulnerability assessment

The cyrus sasl packag

  • The cyrus sasl packag

Shellshock: All you need to know about the bash bug vulnerability. http://www.symantec.com/connect/blogs/ shellshock-all-you-need-know-about-bash-bug-vulnerability

  • Shellshock: All you need to know about the bash bug vulnerability. http://www.symantec.com/connect/blogs/ shellshock-all-you-need-know-about-bash-bug-vulnerability

The cracklib package

  • The cracklib package

Vulnerabilities and version details. https://www.cvedetails.com/version-list

  • Vulnerabilities and version details. https://www.cvedetails.com/version-list

7 ways vulnerability scanners may harm website(s) and what to do about it. https://www.whitehatsec.com/blog/ 7-ways-vulnerability-scanners-may-harm-websites-and-what-to-do-ab

  • 7 ways vulnerability scanners may harm website(s) and what to do about it. https://www.whitehatsec.com/blog/ 7-ways-vulnerability-scanners-may-harm-websites-and-what-to-do-ab