Title :
Probability of Attack Based on System Vulnerability Life Cycle
Author :
Jumratjaroenvanit, Amontip ; Teng-amnuay, Yunyong
Author_Institution :
Inf. Syst. Eng. Lab., Chulalongkorn Univ., Bangkok
Abstract :
The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of life-cycle: zero-day attack, pseudo zero-day attack, potential of pseudo zero-day attack, potential of attack, and passive attack. Pseudo zero-day attack, which results from leniency on the part of system administrators, has significant percentage and is on the rise. Various factors, such as availability of patches and exploit codes, contribute to the probability of attack. This can help administrators prioritize their workload.
Keywords :
security of data; attack probability; cyber world; exploit codes; passive attack; pseudo zero-day attack; system vulnerability life cycle; Cellular neural networks; Computer hacking; Computer security; Databases; Electronic commerce; Information security; Information systems; Laboratories; Systems engineering and theory; Web sites; Exploit code; Exploits; Exposure; Life cycle; POA; Radar chart; Risk window; Vulnerability; Zero-day attack;
Conference_Titel :
Electronic Commerce and Security, 2008 International Symposium on
Conference_Location :
Guangzhou City
Print_ISBN :
978-0-7695-3258-5
DOI :
10.1109/ISECS.2008.212