Plug-and-play System for Scanning and Intelligent Diagnosis of Residential Network Vulnerabilities

  • Heitor Scalco Neto IFC
  • Gustavo Schwitzki Peretti IFC
  • Gabriel Moura Jappe IFC
  • Rodrigo Treichel César Pereira UFSM
  • Alisson Borges Zanetti IFC
  • Danimar Veriato IFC
  • Walter Priesnitz Filho UFSM

Resumo


Cybersecurity has become increasingly critical as the frequency of cyber attacks continues to rise. While critical infrastructures adopt measures to mitigate risks, the lack of protection in residential networks is often underestimated. This issue becomes more alarming as the number of reported vulnerabilities grows in parallel with the proliferation of Internet-connected devices and the expansion of the Internet of Things (IoT). In this context, this paper presents a plug-and-play vulnerability scanner built on a Raspberry Pi, designed to assist in identifying and addressing security flaws in residential environments. The proposed system integrates a Large Language Model (LLM) to generate user-friendly guidance for individuals without technical expertise. Its operation relies on three components: Nmap, used to detect devices and services within the network; the National Vulnerability Database (NVD) API, employed to retrieve Common Vulnerabilities and Exposures (CVE) associated with the detected services; and a Gemini client, which processes the retrieved CVE data to produce explanatory texts and practical remediation instructions. The system was validated in a scenario using a vulnerable target device running Metasploitable3. The results demonstrated that the application successfully identified multiple services and corresponding vulnerabilities, confirming its effectiveness in detecting potential threats. The significance of this implementation lies in its ability to present publicly available vulnerability information in a clear and accessible manner, contributing to the prevention of personal data exposure through compromised residential devices.
Palavras-chave: Vulnerabilities, Nmap, Internet of Things

Referências

CERT.br, “Incidentes notificados ao cert.br,” 2025, acesso em: 8 out. 2025. [Online]. Available: [link]

T. A. Coleti, R. Balancieri, A. Menolli, O. A. Mahmoud, V. H. Sotti, M. Yvano, and M. Morandini, “Handling of personal data by smart home equipment: an exploratory analysis in the context of lgpd,” Journal on Interactive Systems, vol. 15, no. 1, pp. 311–322, 2024.

National Vulnerability Database, “Search and Statistics,” 2025, acesso em: 19 jul. 2025. [Online]. Available: [link]

Dr.Web, “Void captures over a million android tv boxes,” 2024, acesso em: 21 oct. 2024. [Online]. Available: [link]

H. Aarseth, “Identifying vulnerable services using non-intrusive techniques,” Master’s thesis, University of Oslo, 2023.

J. Wołoszyn and M. Wołoszyn, “Using nmap and python for an automated network security audit,” Dydaktyka informatyki, vol. 19, pp. 227–238, 2024.

J. P. Seara and C. Serrão, “Automation of system security vulnerabilities detection using open-source software,” Electronics, vol. 13, no. 5, p. 873, 2024.

S. Shah and B. Mehtre, “An automated approach to vulnerability assessment and penetration testing using net-nirikshak 1.0,” in 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies. IEEE, 2014, pp. 707–712.

W. A. Alyani and A. Nasir, “Development of raspberry-pi kali linux kit as vulnerability scan,” International Journal of Synergy in Engineering and Technology, vol. 5, no. 2, pp. 1–9, 2024.

R. Ritzkal, P. P. Amalia, W. Mahmud, A. H. Hendrawan, B. A. Prakoso, I. Riawan et al., “Security vulnerability analysis and recommendations for open media vault cloud server on raspberry pi,” Ingenierie des Systemes d’Information, vol. 28, no. 3, p. 711, 2023.

National Vulnerability Database, “General,” 2025, acesso em: 19 jul. 2025. [Online]. Available: [link]

K. S. Brant Cheikes, David Waltermire, “Common platform enumeration: Naming specification version 2.3,” National Institute of Standards and Technology (NIST), Tech. Rep., 2011. [Online]. Available: [link]

National Vulnerability Database, “CVEs and the NVD Process,” 2024, acesso em: 19 jul. 2025. [Online]. Available: [link]

eLinux, “Rpi hub,” 2023. [Online]. Available: [link]

S. E. Mathe, H. K. Kondaveeti, S. Vappangi, S. D. Vanambathina, and N. K. Kumaravelu, “A comprehensive review on applications of raspberry pi,” Computer Science Review, vol. 52, p. 100636, 2024.

G. F. Lyon, Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, 2009.

G. Team, “Gemini: A family of highly capable multimodal models,” 2025. [Online]. Available: [link]

Gemini, “An overview of the gemini app,” 2025. [Online]. Available: [link]

G. A. for Developers, Using Gemini API keys, 2025, acesso em: 20 jul. 2025. [Online]. Available: [link]

D. Papakyriakou and I. S. Barbounakis, “Benchmarking and review of raspberry pi (rpi) 2b vs rpi 3b vs rpi 3b+ vs rpi 4b (8gb),” International Journal of Computer Applications, vol. 185, no. 3, pp. 37–52, 2023.

Pallets, Flask Documentation (3.1.x), 2024, acesso em: 30 maio 2025. [Online]. Available: [link]

V. A. Saber, “Exploring the correlation between vulnerability scanning and nmap,” International Journal of Intelligent Computing and Information Sciences, vol. 25, no. 1, pp. 41–50, 2025.
Publicado
22/10/2025
SCALCO NETO, Heitor; PERETTI, Gustavo Schwitzki; JAPPE, Gabriel Moura; PEREIRA, Rodrigo Treichel César; ZANETTI, Alisson Borges; VERIATO, Danimar; PRIESNITZ FILHO, Walter. Plug-and-play System for Scanning and Intelligent Diagnosis of Residential Network Vulnerabilities. In: CONGRESSO LATINO-AMERICANO DE SOFTWARE LIVRE E TECNOLOGIAS ABERTAS (LATINOWARE), 22. , 2025, Foz do Iguaçu/PR. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2025 . p. 626-632. DOI: https://doi.org/10.5753/latinoware.2025.16557.