首页> 外文期刊>IEEE security & privacy >Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities
【24h】

Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities

机译:通过确定攻击者针对的漏洞来优先考虑漏洞修复

获取原文
获取原文并翻译 | 示例
           

摘要

This article attempts to empirically analyze which vulnerabilities attackers tend to target in order to prioritize vulnerability remediation. This analysis focuses on the link between malicious connections and vulnerabilities, where each connection is considered malicious. Attacks requiring multiple connections are counted as multiple attacks. As the number of connections increases, so does the cost of recovering from the intrusion. The authors deployed four honey pots for four months, each running a different Windows service pack with its associated set of vulnerabilities. They then performed three empirical analyses to determine the relationship between the number of malicious connections and the total number of vulnerabilities, the number of malicious connections and the number of the vulnerabilities for different services, and the number of known successful attacks and the number of vulnerabilities for different services.
机译:本文尝试根据经验分析攻击者倾向于针对哪些漏洞,以便优先考虑漏洞修复。此分析着重于恶意连接与漏洞之间的链接,其中每个连接都被视为恶意。需要多个连接的攻击被视为多次攻击。随着连接数量的增加,从入侵中恢复的成本也随之增加。作者部署了四个月的蜜罐,每个蜜罐运行一个带有其相关漏洞集的不同Windows Service Pack。然后,他们进行了三个实证分析,以确定恶意连接数与漏洞总数,不同服务的恶意连接数和漏洞数之间的关系,以及已知成功攻击的次数和漏洞数。为不同的服务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号