A Trend Analysis of Exploitations
نویسندگان
چکیده
We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumulative count of reported incidents, M is the time since the start of the exploit cycle, and I and S are the regression coefficients determined by analysis of the incident report data. Further analysis of two additional exploits involving vulnerabilities in mountd and statd confirm the model. We believe that the models will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports. This work was sponsored in part by an IBM Faculty Partnership Award. yThis work was sponsored by the Department of Defense. A Trend Analysis of Exploitations Abstract We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumulative count of reported incidents, M is the time since the start of the exploit cycle, and I and S are the regression coefficients determined by analysis of the incident report data. Further analysis of two additional exploits involving vulnerabilities in mountd and statd confirm the model. We believe that the models will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports.We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumulative count of reported incidents, M is the time since the start of the exploit cycle, and I and S are the regression coefficients determined by analysis of the incident report data. Further analysis of two additional exploits involving vulnerabilities in mountd and statd confirm the model. We believe that the models will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports.
منابع مشابه
Negative impacts of mine exploitations on rural regions of Tekab Township
This descriptive analytical survey was aimed to study the negative impacts of mine exploitations carried out in the rural regions of the Tekab Township located in Iran. The statistical population of the studied areas consisted of all the heads of the rural households in the villages located in the vicinity of the mines in the Tekab Township (N=2680). According to the Cochran formula, a sample s...
متن کاملTrend analysis of discharge changes in the watershed of Nahrin Tabas Dam watershed using parametric and non-parametric methods
The trend of river discharge changes in arid and semi-arid regions is mostly decreasing and this trend can be influenced by climatic factors and rising temperatures in recent decades in these areas. This reduction in discharge could have a significant impact on the water storage of the Nahrin Dam and agriculture, industry and drinking water in Tabas City, which should be considered by experts. ...
متن کاملCorpus-driven Lexical Analysis: Norms and Exploitations in Word Use
It is a truism that meaning depends on context. Corpus evidence now shows us that normal contexts can be summarised and indeed quantified, while the creative exploitations of normal contexts by ordinary language users far exceed anything dreamed up in speculative linguistic theory. Human linguistic behaviour is indeed rule-governed, but in recent years, corpus analysis (e.g. Hanks 2013) has sho...
متن کاملSwarm Intelligence Algorithm with Guided Exploitations: A Case Study with Artificial Bee Colony Algorithm
During any meta-heuristic search, two opposite processes are found in action, namely the explorations and exploitations. Although they might seem to operate in opposite directions, they are actually counterparts, and synergy between them may improve the final outcome of the algorithm. This is especially true for complex, high dimensional problems, because the search algorithm has to avoid many ...
متن کاملArtificial Bee Colony Algorithm with Adaptive Explorations and Exploitations: A Novel Approach for Continuous Optimization
A proper balance between global explorations and local exploitations is often considered necessary for complex, high dimensional optimization problems to avoid local optima and to find a good near optimum solution with sufficient convergence speed. This paper introduces Artificial Bee Colony algorithm with Adaptive eXplorations and eXploitations (ABC-AX), a novel algorithm that improves over th...
متن کامل