At the moment, the use of server devices, web applications, routers, switches, etc. has become widespread in modern information systems. These technologies have quite important advantages in the form of ease of use, a simple and convenient interface, even if their work is carried out through the use of the command line, the possibility of remote work via the Internet, as well as technologies for fast deployment. Quite often, modern technologies also have a large number of problems related to information security, because the development, testing and establishment of data transmission protocols between devices, the formation of the enterprise network architecture is very often carried out in a short time, and the company's resources become available via the Internet for users of both the company and customers, and for intruders. Vulnerabilities of varying degrees allow third parties to steal corporate information, carry out unauthorized data changes, disrupt the availability of enterprise applications, and cause Denial-of-Service problems. Currently, the problem of ensuring the security of infocommunication technologies is very relevant, so, according to, more than 60 % of all detected vulnerabilities relate to applications that use access to an external network. And more than 70 % of companies have critical risks of exploiting vulnerabilities in case of intrusion from the external perimeter of the network. One of the widespread methods of ensuring the security of network devices is the detection of vulnerabilities in order to eliminate them later. In this paper, modern methods and techniques of passive vulnerability detection in network systems are considered and their capabilities are analyzed.
Read full abstract