메뉴 건너뛰기




Volumn , Issue , 2010, Pages 105-113

Beyond heuristics: Learning to classify vulnerabilities and predict exploits

Author keywords

Exploits; Supervised learning; SVM; Vulnerabilities

Indexed keywords

BUFFER OVERFLOW ERRORS; ENTERPRISE IS; EXPERT KNOWLEDGE; EXPLOITS; HIGH DIMENSIONAL FEATURE; SIDE EFFECT; SOFTWARE SYSTEMS; SOFTWARE VULNERABILITIES; SVM; SYSTEM ADMINISTRATION; SYSTEMS ADMINISTRATOR; TEXT FIELDS; TIME STAMPS; VULNERABILITIES; VULNERABILITY DISCLOSURE;

EID: 77956214438     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1835804.1835821     Document Type: Conference Paper
Times cited : (226)

References (22)
  • 1
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. A. Arbaugh, W. L. Fithen, and J. McHugh. Windows of vulnerability: A case study analysis. Computer, 33(12):52-59, 2000.
    • (2000) Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 2
    • 33846183559 scopus 로고    scopus 로고
    • Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    • A. Arora, A. Nandkumar, and R. Telang. Does information security attack frequency increase with vulnerability disclosure? an empirical analysis. Information Systems Frontiers, 8(5), 2006.
    • (2006) Information Systems Frontiers , vol.8 , Issue.5
    • Arora, A.1    Nandkumar, A.2    Telang, R.3
  • 4
    • 33747205462 scopus 로고    scopus 로고
    • On the brittleness of software and the infeasibility of security metrics
    • July
    • S. M. Bellovin. On the Brittleness of Software and the Infeasibility of Security Metrics. IEEE Security and Privacy, 4(4), July 2006.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.4
    • Bellovin, S.M.1
  • 7
    • 77956194042 scopus 로고    scopus 로고
    • Updated on July 24, 2008
    • C. Dougherty. Vulnerability metric, Updated on July 24, 2008. https://www.securecoding.cert.org/confluence/display/seccode/ Vulnerabil%ity+Metric.
    • Vulnerability Metric
    • Dougherty, C.1
  • 11
    • 77956219331 scopus 로고    scopus 로고
    • IBM internet security systems X-force 2008 trend and risk report
    • Jan.
    • IBM. IBM Internet Security Systems X-Force 2008 Trend and Risk Report. White paper, Jan. 2009. http://www-935.ibm.com/services/us/iss/xforce/ trendreports/xforce-2008-%annual-report.pdf.
    • (2009) White Paper
  • 14
    • 84885948362 scopus 로고    scopus 로고
    • Microsoft TechNet Security Team. Microsoft Security Bulletin. http://www.microsoft.com/technet/security/current.aspx.
    • Microsoft Security Bulletin
  • 20
  • 21


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.