SVED: Scanning, Vulnerabilities, Exploits and Detection
Title | SVED: Scanning, Vulnerabilities, Exploits and Detection |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Holm, H., Sommestad, T. |
Conference Name | MILCOM 2016 - 2016 IEEE Military Communications Conference |
Keywords | compositionality, computer security, cyber security experiments, Databases, distributed architecture, exploits and detection tool, Human Behavior, human factors, Intelligent sensors, Intrusion Detection Systems, malicious actions, Metrics, pubcrawl, Resiliency, scanning, security of data, Sensor systems, Software, SVED, threat intelligence information, vulnerabilities, vulnerability detection |
Abstract | This paper presents the Scanning, Vulnerabilities, Exploits and Detection tool (SVED). SVED facilitates reliable and repeatable cyber security experiments by providing a means to design, execute and log malicious actions, such as software exploits, as well the alerts provided by intrusion detection systems. Due to its distributed architecture, it is able to support large experiments with thousands of attackers, sensors and targets. SVED is automatically updated with threat intelligence information from various services. |
DOI | 10.1109/MILCOM.2016.7795457 |
Citation Key | holm_sved:_2016 |
- Metrics
- vulnerability detection
- vulnerabilities
- threat intelligence information
- SVED
- Software
- Sensor Systems
- security of data
- scanning
- Resiliency
- pubcrawl
- Compositionality
- malicious actions
- Intrusion Detection Systems
- Intelligent sensors
- Human Factors
- Human behavior
- exploits and detection tool
- distributed architecture
- Databases
- cyber security experiments
- computer security