Corpus ID: 7561947

VmiCVS : Cloud Vulnerability Scanner

@inproceedings{Krishna2016VmiCVSC,
  title={VmiCVS : Cloud Vulnerability Scanner},
  author={A. Krishna and R. Ricci},
  year={2016}
}
Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners use methods that an attacker uses to attack in order to expose the vulnerabilities. As a result… Expand

Figures and Tables from this paper

Failure-Aware Application Placement Modeling and Optimization in High Turnover DevOps Environment
TLDR
This paper proposes proactive application placement algorithms with prediction of infrastructure failures, and builds stochastic models for application turnover and infrastructure failure processes, and provides various types of Failure-Index. Expand

References

SHOWING 1-10 OF 15 REFERENCES
A quantitative evaluation of vulnerability scanning
TLDR
The data collected in this study show that authenticated vulnerability scanning is usable, however, automated scanning is not able to accurately identify all vulnerabilities present in computer networks. Expand
2009 Data Breach Investigations Report
Healthcare Read time: < 4 minutes 4 Almost three quarters of security incidents in healthcare in 2015 involved physical theft and loss, insider and privilege misuse and miscellaneous errors. WhileExpand
Library Interface Versioning in Solaris and Linux
TLDR
The library symbol-versioning technology in Linux and Solaris is described, the ways in which it is used to support upward compatibility for existing compiled applications from one release of Solaris to the next, and the potential for similar mechanisms to be applied in Linux versioned shared libraries. Expand
Vulnerability assessment guide. http://scitechconnect.elsevier.com/wp-content/ uploads
  • Vulnerability assessment guide. http://scitechconnect.elsevier.com/wp-content/ uploads
  • 2013
Ghost vulnerability. https://access.redhat.com/articles
  • Ghost vulnerability. https://access.redhat.com/articles
  • 1332
7 ways vulnerability scanners may harm website(s) and what to do about it. https://www.whitehatsec.com/blog/ 7-ways-vulnerability-scanners-may-harm-websites-and-what-to-do-ab
  • 7 ways vulnerability scanners may harm website(s) and what to do about it. https://www.whitehatsec.com/blog/ 7-ways-vulnerability-scanners-may-harm-websites-and-what-to-do-ab
Openssl dos vulnerability, new bagel variants. https://isc.sans.edu/forums/diary/Updated+1345+ 318+GMT+OpenSSL+DoS+Vulnerability+New+ Bagel+Variants
  • Openssl dos vulnerability, new bagel variants. https://isc.sans.edu/forums/diary/Updated+1345+ 318+GMT+OpenSSL+DoS+Vulnerability+New+ Bagel+Variants
Shellshock: All you need to know about the bash bug vulnerability. http://www.symantec.com/connect/blogs/ shellshock-all-you-need-know-about-bash-bug-vulnerability
  • Shellshock: All you need to know about the bash bug vulnerability. http://www.symantec.com/connect/blogs/ shellshock-all-you-need-know-about-bash-bug-vulnerability
The cracklib package
  • The cracklib package
...
1
2
...