1. National Institute of Standards and Technology (NIST). (2008). Technical Guide to Information Security Testing and Assessment (Special Publication 800-115).
Section 3.2
"Discovery
" describes this phase as the start of testing
used to "identify systems and the information on them" and to "develop a map of the network." This directly supports the concept of scanning to understand where the scan will go.
2. CompTIA. (2022). CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives CS0-003.
Exam Objective 2.1
"Explain the importance of vulnerability management
" lists "Discovery" as a specific type of scan. This confirms its relevance and distinction from other scan types within the official exam curriculum.
3. Kruegel
C.
& Vigna
G. (2003). Anomalous Payload-Based Network Intrusion Detection. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID '02).
The paper
in its discussion of web application analysis
implicitly supports the concept of a discovery/crawling phase. Section 3
"Web Application Analysis
" describes the initial step as crawling the web application to "build a model of the application
" which is synonymous with a discovery scan's purpose of mapping URIs before deeper analysis. (Available via Springer or university libraries).