Sciweavers

IJSN
2007
82views more  IJSN 2007»
13 years 11 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
ISF
2008
114views more  ISF 2008»
13 years 11 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
COMCOM
2007
100views more  COMCOM 2007»
13 years 11 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
DSS
2006
91views more  DSS 2006»
13 years 11 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
CIIT
2004
132views Communications» more  CIIT 2004»
14 years 1 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
DSN
2008
IEEE
14 years 1 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CIKM
2008
Springer
14 years 1 months ago
Vanity fair: privacy in querylog bundles
A recently proposed approach to address privacy concerns in storing web search querylogs is bundling logs of multiple users together. In this work we investigate privacy leaks tha...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
CCS
2008
ACM
14 years 1 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
14 years 3 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 3 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...