Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/8607
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Malkawi M. | - |
dc.contributor.author | Özyer T. | - |
dc.contributor.author | Alhajj R. | - |
dc.date.accessioned | 2022-07-30T16:41:54Z | - |
dc.date.available | 2022-07-30T16:41:54Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Malkawi, M., Özyer, T., & Alhajj, R. (2021, November). Automation of active reconnaissance phase: an automated API-based port and vulnerability scanner. In Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 622-629). | en_US |
dc.identifier.isbn | 9781450391283 | - |
dc.identifier.uri | https://doi.org/10.1145/3487351.3492720 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/8607 | - |
dc.description | ACM Special Interest Group on Knowledge Discovery in Data (SIGKDD);Elsevier;IEEE Computer Society;IEEE TCDE;Springer | en_US |
dc.description | 13th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2021 -- 8 November 2021 -- 176732 | en_US |
dc.description.abstract | The unprecedented growth in technology has increased the importance of the required information security that is still hard to be reached. Recently, network and web application attacks have occurred frequently, causing confidential data to be stolen by the available vulnerabilities in the systems and the most prominent is in the form of open ports. This causes the CIA (Confidentiality Integrity and Availability) Triad Model to break. Penetration testing is one of the key techniques used in real life to accurately detect the possible threats and potential attacks against the system, and the first step for hackers to conduct attacks is information collection. In this paper, we present a useful schema for the active information-gathering phase that can be used during penetration testing and by system administrators. It will be the first feature of a security engine going to be implemented. The work involves an automated API-based IP and port scanner, service-version enumerator, and vulnerability detection system. This scheme is based on the Network Mapper (Nmap) to collect the information with high accuracy depending on the provided rules in our schema. Besides, the work has been implemented as a RESTful-API server, aiming at easy integration for real-life cases and allowing administrators to scan and secure their networks more quickly and easily. The effectiveness and efficiency of this technique has been proved by the various test cases applied considering different scenarios from the real world. The average time of scanning a server and detecting the vulnerabilities is 2.2 minutes. Regardless of the number of vulnerabilities, the increase in time for each open port is just about 12 seconds. © 2021 ACM. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery, Inc | en_US |
dc.relation.ispartof | Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2021 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | API | en_US |
dc.subject | cyber reconnaissance | en_US |
dc.subject | information security | en_US |
dc.subject | Nmap | en_US |
dc.subject | penetration testing | en_US |
dc.subject | port scanner | en_US |
dc.subject | security vulnerabilities | en_US |
dc.subject | vulnerability assessment | en_US |
dc.subject | Application programming interfaces (API) | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Network security | en_US |
dc.subject | Personal computing | en_US |
dc.subject | Scanning | en_US |
dc.subject | API | en_US |
dc.subject | Cybe reconnaissance | en_US |
dc.subject | Network applications | en_US |
dc.subject | Network mapper | en_US |
dc.subject | Penetration testing | en_US |
dc.subject | Port scanner | en_US |
dc.subject | Security vulnerabilities | en_US |
dc.subject | Vulnerability assessments | en_US |
dc.subject | Vulnerability scanner | en_US |
dc.subject | Web application attacks | en_US |
dc.subject | Automation | en_US |
dc.title | Automation of Active Reconnaissance Phase: an Automated Api-Based Port and Vulnerability Scanner | en_US |
dc.type | Conference Object | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.identifier.startpage | 622 | en_US |
dc.identifier.endpage | 629 | en_US |
dc.identifier.scopus | 2-s2.0-85124417139 | en_US |
dc.institutionauthor | Özyer, Tansel | - |
dc.identifier.doi | 10.1145/3487351.3492720 | - |
dc.authorscopusid | 57447908100 | - |
dc.authorscopusid | 8914139000 | - |
dc.authorscopusid | 7004187647 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.