By Topic

Probability of Attack Based on System Vulnerability Life Cycle

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Amontip Jumratjaroenvanit ; Inf. Syst. Eng. Lab., Chulalongkorn Univ., Bangkok ; Yunyong Teng-amnuay

The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of life-cycle: zero-day attack, pseudo zero-day attack, potential of pseudo zero-day attack, potential of attack, and passive attack. Pseudo zero-day attack, which results from leniency on the part of system administrators, has significant percentage and is on the rise. Various factors, such as availability of patches and exploit codes, contribute to the probability of attack. This can help administrators prioritize their workload.

Published in:

Electronic Commerce and Security, 2008 International Symposium on

Date of Conference:

3-5 Aug. 2008