Predicting Exploitations of Information Systems Vulnerabilities Through Attackers’ Characteristics

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Systems Threats and Vulnerabilities

Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...

متن کامل

Measuring, analyzing and predicting security vulnerabilities in software systems

In this work we examine the feasibility of quantitatively characterizing some aspects of security. In particular, we investigate if it is possible to predict the number of vulnerabilities that can potentially be present in a software system but may not have been found yet. We use several major operating systems as representatives of complex software systems. The data on vulnerabilities discover...

متن کامل

Quantifying Information Leak Vulnerabilities

Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to measuring leakage of confidential information could be applied to substantial, real-world programs. This is mostly due to the high complexity of computing precise leakage quantities. In this paper, we introduce a techn...

متن کامل

Vulnerabilities of E-voting Systems

Practically, e-voting should comply with the social acceptance, technology and law. Many believe that e-voting is better than manual voting, as the former has less manual involvement. It is also believed that it is more secure and transparent. However, some security attacks may be launched which result in breaking both voting and e-voting requirements. In this paper, we discuss some aspects of ...

متن کامل

Strategic Modeling of Information Sharing among Data Privacy Attackers

Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary’s background knowledge when reasoning about the protection afforded by various anonymization schemes. Most existing work models the background knowledge of one individual adversary or privacy attacker, or makes a worstcase assumption that attackers will act as one: colluding through sharing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2017

ISSN: 2169-3536

DOI: 10.1109/access.2017.2769063