Waiel M. Eid1,2, Samer Atawneh1, Mousa Al-Akhras1,3,*
Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1319-1334, 2020, DOI:10.32604/iasc.2020.013678
- 24 December 2020
Abstract The huge number of devices available in cyberspace and the increasing number of security vulnerabilities discovered daily have added many difficulties in keeping track of security vulnerabilities, especially when not using special security tools and software. Mass scanning of the Internet has opened a broad range of possibilities for security tools that help cybersecurity centers detect weaknesses and vulnerabilities in cyberspace. However, one critical issue faced by national cybersecurity centers is the collection of information about IP addresses and subnet ranges. To develop a data collection mechanism for such information and maintain this information with… More >