An Analysis of Vulnerability Trends
dc.contributor.author | Browne, Hilary K. | en_US |
dc.contributor.author | Arbaugh, William A. | |
dc.contributor.author | McHugh, John | |
dc.contributor.author | Fithen, William | |
dc.date.accessioned | 2004-05-31T23:08:22Z | |
dc.date.available | 2004-05-31T23:08:22Z | |
dc.date.created | 2000-10 | en_US |
dc.date.issued | 2000-11-13 | en_US |
dc.description.abstract | We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the each exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S * sqrt(M) where C is the cumulative count of reported incidents, M is the time since the start of the exploit cycle, and I and S are the regression coefficients determined by analysis of the incident report data. Further analysis of two additional exploits involving vulnerabilities in mountd and statd confirm the model. We believe that the models will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports. (Also cross-referenced as UMIACS-TR-2000-76) | en_US |
dc.format.extent | 1093018 bytes | |
dc.format.mimetype | application/postscript | |
dc.identifier.uri | http://hdl.handle.net/1903/1112 | |
dc.language.iso | en_US | |
dc.relation.isAvailableAt | Digital Repository at the University of Maryland | en_US |
dc.relation.isAvailableAt | University of Maryland (College Park, Md.) | en_US |
dc.relation.isAvailableAt | Tech Reports in Computer Science and Engineering | en_US |
dc.relation.isAvailableAt | UMIACS Technical Reports | en_US |
dc.relation.ispartofseries | UM Computer Science Department; CS-TR-4200 | en_US |
dc.relation.ispartofseries | UMIACS; UMIACS-TR-2000-76 | en_US |
dc.title | An Analysis of Vulnerability Trends | en_US |
dc.type | Technical Report | en_US |