Visible to the public SVED: Scanning, Vulnerabilities, Exploits and Detection

TitleSVED: Scanning, Vulnerabilities, Exploits and Detection
Publication TypeConference Paper
Year of Publication2016
AuthorsHolm, H., Sommestad, T.
Conference NameMILCOM 2016 - 2016 IEEE Military Communications Conference
Keywordscompositionality, computer security, cyber security experiments, Databases, distributed architecture, exploits and detection tool, Human Behavior, human factors, Intelligent sensors, Intrusion Detection Systems, malicious actions, Metrics, pubcrawl, Resiliency, scanning, security of data, Sensor systems, Software, SVED, threat intelligence information, vulnerabilities, vulnerability detection
Abstract

This paper presents the Scanning, Vulnerabilities, Exploits and Detection tool (SVED). SVED facilitates reliable and repeatable cyber security experiments by providing a means to design, execute and log malicious actions, such as software exploits, as well the alerts provided by intrusion detection systems. Due to its distributed architecture, it is able to support large experiments with thousands of attackers, sensors and targets. SVED is automatically updated with threat intelligence information from various services.

DOI10.1109/MILCOM.2016.7795457
Citation Keyholm_sved:_2016