Abstract

In the realities of today's world, including the transition from WEB 2.0 to WEB 3.0. Every day there are new products that make human life more convenient. This applies to software that is used in business or everyday life. The emergence of new software from different levels of experts bear in themselves both positive and negative aspects. Following the emergence of new technologies, new threats also appear. Over 2022, 70 % of the most exploited vulnerabilities were due to software vulnerabilities. This article attempts to develop an effective software vulnerability analyzer with monitoring functionality capable of detecting new vulnerabilities without causing a load on the network. The article will describe the stages of the article's development, the principle of the program's work, information about the sources of obtaining data on the target system and on the vulnerability database. The monitoring process and operator's capabilities in obtaining information about the vulnerabilities will be described. To test the efficiency of the work, a test bench with vulnerabilities will be prepared on which the efficiency of the developed analyzer and the tool with similar functionality will be tested.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.