DocumentCode :
2676336
Title :
Probability of Attack Based on System Vulnerability Life Cycle
Author :
Jumratjaroenvanit, Amontip ; Teng-amnuay, Yunyong
Author_Institution :
Inf. Syst. Eng. Lab., Chulalongkorn Univ., Bangkok
fYear :
2008
fDate :
3-5 Aug. 2008
Firstpage :
531
Lastpage :
535
Abstract :
The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of life-cycle: zero-day attack, pseudo zero-day attack, potential of pseudo zero-day attack, potential of attack, and passive attack. Pseudo zero-day attack, which results from leniency on the part of system administrators, has significant percentage and is on the rise. Various factors, such as availability of patches and exploit codes, contribute to the probability of attack. This can help administrators prioritize their workload.
Keywords :
security of data; attack probability; cyber world; exploit codes; passive attack; pseudo zero-day attack; system vulnerability life cycle; Cellular neural networks; Computer hacking; Computer security; Databases; Electronic commerce; Information security; Information systems; Laboratories; Systems engineering and theory; Web sites; Exploit code; Exploits; Exposure; Life cycle; POA; Radar chart; Risk window; Vulnerability; Zero-day attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronic Commerce and Security, 2008 International Symposium on
Conference_Location :
Guangzhou City
Print_ISBN :
978-0-7695-3258-5
Type :
conf
DOI :
10.1109/ISECS.2008.212
Filename :
4606122
Link To Document :
بازگشت