I. Introduction
Nowadays, the complexity of single systems and computer networks has reached a level which is almost unfeasible to maintain manually by system administrators. The total amount of different software, operating systems, specific versions, and individual configurations on a single computer exceeds the manageable number by far. Additionally, the possibilities to combine and link systems in a network increase this complexity. Thus, detecting vulnerabilities in a single system or in computer networks is a crucial problem. Especially large networks with numerous connected individual systems are difficult to analyze. The unique configuration of each system requires a new scan to identify the setup.