Heterogeneous Network Mining of the National Vulnerability Database

نویسنده

  • Andrew Driggs
چکیده

As the proliferation of on-line information storage and interaction continues, so does the continued threat to the security of users and their data. New vulnerabilities are found daily in various pieces of software, used by both users and providers of on-line services, not to mention the myriad of web applications that are not tracked by any central system. Previous research into trends in vulnerabilities has been fairly rudimentary, and is definitely outdated at this point. By taking data from the National Vulnerability Database and applying an implementation of PathSim, this paper hopes to show not only improved ability to see trends in vulnerabilities, but also to possibly attempt to predict the next Heartbleed level vulnerability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

Developing a 3D stochastic discrete fracture network model for hydraulic analyses

Fluid flow in jointed rock mass with impermeable matrix is often controlled by joint properties, including aperture, orientation, spacing, persistence and etc. On the other hand, since the rock mass is made of heterogeneous and anisotropic natural materials, geometric properties of joints may have dispersed values. One of the most powerful methods for simulation of stochastic nature of geometri...

متن کامل

Network Risk Evaluation by Data Mining

Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...

متن کامل

Estimation of Punching Shear Capacity of Concrete Slabs Using Data Mining Techniques

Punching shear capacity is a key factor for governing the collapsed form of slabs. This fragile failure that occurs at the slab-column connection is called punching shear failure and has been of concern for the engineers. The most common practice in evaluating the punching strength of the concrete slabs is to use the empirical expressions available in different building design codes. The estima...

متن کامل

Emerging Standards

example, should they first address a vulnerability with a severity of “5” or one with a severity of “high”? The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National Institute of Stand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016