Sciweavers

ISECS
2008
IEEE

Probability of Attack Based on System Vulnerability Life Cycle

14 years 6 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of life-cycle: zero-day attack, pseudo zero-day attack, potential of pseudo zero-day attack, potential of attack, and passive attack. Pseudo zero-day attack, which results from leniency on the part of system administrators, has significant percentage and is on the rise. Various factors, such as availability of patches and exploit codes, contribute to the probability of attack. This can help administrators prioritize their workload.
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
Added 31 May 2010
Updated 31 May 2010
Type Conference
Year 2008
Where ISECS
Authors Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
Comments (0)