메뉴 건너뛰기




Volumn 30, Issue 1, 2011, Pages 50-62

Modeling vulnerability discovery process in Apache and IIS HTTP servers

Author keywords

Quantitative modeling; Risk evaluation; Security; Vulnerability discovery model (VDM); Web server

Indexed keywords

QUANTITATIVE MODELING; RISK EVALUATION; SECURITY; VULNERABILITY DISCOVERY; WEB SERVERS;

EID: 79251599901     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.10.007     Document Type: Article
Times cited : (35)

References (50)
  • 4
    • 41449117969 scopus 로고    scopus 로고
    • Application of vulnerability discovery models to major operating systems
    • O.H. Alhazmi, and Y.K. Malaiya Application of vulnerability discovery models to major operating systems IEEE Transactions on Reliability March 2008 14 22
    • (2008) IEEE Transactions on Reliability , pp. 14-22
    • Alhazmi, O.H.1    Malaiya, Y.K.2
  • 5
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting security vulnerabilities in software systems
    • O.H. Alhazmi, Y.K. Malaiya, and I. Ray Measuring, analyzing and predicting security vulnerabilities in software systems Computers & Security 26 3 May 2007 219 228
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 6
    • 0038443107 scopus 로고    scopus 로고
    • A new taxonomy of web attacks suitable for efficient encoding
    • 10.1016/S0167-4048(03)00512-1 ISSN: 0167-4048
    • G. Alvarez, and Slobodan Petrovic A new taxonomy of web attacks suitable for efficient encoding Computers & Security 22 5 July 2003 435 449 10.1016/S0167-4048(03)00512-1 ISSN: 0167-4048
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 435-449
    • Alvarez, G.1    Petrovic, S.2
  • 7
    • 26444448266 scopus 로고    scopus 로고
    • Security in open versus closed systems - The dance of Boltzmann, Coase and Moore
    • Anderson R. Security in open versus closed systems - the dance of Boltzmann, Coase and Moore. In: Conf. on open source software: economics, law and policy; 2002. p. 1-15.
    • (2002) Conf. on Open Source Software: Economics, Law and Policy , pp. 1-15
    • Anderson, R.1
  • 10
    • 79251597484 scopus 로고    scopus 로고
    • BEA Systems
    • BEA Systems http://www.bea.com April 2010
    • (2010)
  • 15
    • 67650108546 scopus 로고    scopus 로고
    • The life and death of statically detected vulnerabilities: An empirical study
    • M. Di Penta, L. Cerulo, and L. Aversano The life and death of statically detected vulnerabilities: an empirical study Information and Software Technology 51 10 October 2009 1469 1484
    • (2009) Information and Software Technology , vol.51 , Issue.10 , pp. 1469-1484
    • Di Penta, M.1    Cerulo, L.2    Aversano, L.3
  • 22
    • 0031099876 scopus 로고    scopus 로고
    • Reexamining the fault density-component size connection
    • L. Hatton Reexamining the fault density-component size connection IEEE Software March 1997 89 97
    • (1997) IEEE Software , pp. 89-97
    • Hatton, L.1
  • 23
    • 79251599473 scopus 로고    scopus 로고
    • IIS vs. Apache
    • IIS vs. Apache, Looking Beyond the Rhetoric http://www.serverwatch.com/ tutorials/article.php/3074841 April 2010
    • (2010) Looking Beyond the Rhetoric
  • 32
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The DIMACS software security workshop
    • G. McGraw From the ground up: the DIMACS software security workshop IEEE Security and Privacy 1 2 March/April 2003 59 66
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1
  • 33
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an internet worm
    • Moore D, Shannon C, Claffy KC. Code-red: a case study on the spread and victims of an internet worm. In: Internet measurement workshop; 2002. p. 273-84.
    • (2002) Internet Measurement Workshop , pp. 273-284
    • Moore, D.1    Shannon, C.2    Claffy, K.C.3
  • 34
  • 36
    • 79251596794 scopus 로고    scopus 로고
    • Netcraft http://news.netcraft.com/ April 2010
    • (2010)
  • 37
    • 79251600564 scopus 로고    scopus 로고
    • National Vulnerability Database (NVD) http://nvd.nist.gov/ April 2010
    • (2010)
  • 38
    • 79251598705 scopus 로고    scopus 로고
    • Oracle WebLogic Server http://www.oracle.com/technology/products/ Weblogic/index.html April 2010
    • (2010)
  • 39
    • 79251593074 scopus 로고    scopus 로고
    • Open Source Vulnerability Database (OSVDB) http://osvdb.org April 2010
    • (2010)
  • 42
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • E. Rescorla Is finding security holes a good idea? IEEE Security and Privacy 2005 14 19
    • (2005) IEEE Security and Privacy , pp. 14-19
    • Rescorla, E.1
  • 43
  • 46
    • 79251595785 scopus 로고    scopus 로고
    • Secunia http://secunia.com/ April 2010
    • (2010)
  • 47
    • 79251596406 scopus 로고    scopus 로고
    • Securityfocus http://www.securityfocus.com/ April 2010
    • (2010)
  • 48
    • 79251593604 scopus 로고    scopus 로고
    • SLOCCount
    • SLOCCount http://dwheeler.com/sloccount April 2010
    • (2010)
  • 49
    • 49849085708 scopus 로고    scopus 로고
    • Standardizing vulnerability categories
    • 10.1016/j.cose.2008.04.002 ISSN: 0167-4048
    • H.S. Venter, J.H.P. Eloff, and Y.L. Li Standardizing vulnerability categories Computers & Security 27 3-4 May-June 2008 71 83 10.1016/j.cose.2008.04.002 ISSN: 0167-4048
    • (2008) Computers & Security , vol.27 , Issue.34 , pp. 71-83
    • Venter, H.S.1    Eloff, J.H.P.2    Li, Y.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.