Skip to Main Content
The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of life-cycle: zero-day attack, pseudo zero-day attack, potential of pseudo zero-day attack, potential of attack, and passive attack. Pseudo zero-day attack, which results from leniency on the part of system administrators, has significant percentage and is on the rise. Various factors, such as availability of patches and exploit codes, contribute to the probability of attack. This can help administrators prioritize their workload.