Analysis of software vulnerability classification based on different technical parameters

被引:11
|
作者
Garg, Shivi [1 ]
Singh, R. K. [1 ]
Mohapatra, A. K. [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Informat Technol Dept, New Delhi, India
来源
INFORMATION SECURITY JOURNAL | 2019年 / 28卷 / 1-2期
关键词
Malicious; malware; software; security; taxonomy; vulnerability; EMBEDDED SYSTEMS SECURITY; ATTACK; MODEL;
D O I
10.1080/19393555.2019.1628325
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive analysis of software vulnerabilities based on different technical parameters. The taxonomy of vulnerabilities presented here offers an insight into their frequency; susceptibility; correlation with instances or events, exploits, and artifacts; and assessment of the successful countermeasures. Furthermore, this paper presents the current state-of-the-art in the domain of software threats and vulnerabilities. In addition, it highlights various methods for identification of different types of vulnerabilities. These methods have their own advantages, associated costs, and inherent risks. The current work would help analyze various threats that a system could face, and subsequently it could guide the security engineer to take quick and cost-effective countermeasures.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [21] An empirical analysis for software robustness vulnerability in terms of modularity quality
    Abadeh, Maryam Nooraei
    Mirzaie, Mansooreh
    SYSTEMS ENGINEERING, 2023, 26 (06) : 754 - 769
  • [22] A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles
    Shahzad, Muhammad
    Shafiq, Muhammad Zubair
    Liu, Alex X.
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 771 - 781
  • [23] Predicting Severity of Software Vulnerability Based on Grey System Theory
    Geng, Jinkun
    Ye, Daren
    Luo, Ping
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 143 - 152
  • [24] BI-PARAMETERS METHOD FOR STRUCTURAL VULNERABILITY ANALYSIS
    Sun, Limin
    Yu, Gang
    Sun, Zhi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (05): : 747 - 754
  • [25] Vulnerability analysis of urban road networks based on traffic situation
    Wang, Ziqi
    Pei, Yulong
    Liu, Jing
    Liu, Hehang
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 41
  • [26] A Methodology to Evaluate the Vulnerability of the Natural Gas Supply Chain Based on Set Pair Analysis and Markov Chain
    Yu, Weichao
    Zheng, Xianbin
    Wen, Feng
    Li, Lin
    Yue, Yuanzhi
    Shi, Feng
    Yang, Hong
    Liu, Yang
    Liu, Xiaoben
    JOURNAL OF PIPELINE SYSTEMS ENGINEERING AND PRACTICE, 2023, 14 (02)
  • [27] An integrated framework for software vulnerability detection, analysis and mitigation: an autonomic system
    Kumar, Manoj
    Sharma, Arun
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (09): : 1481 - 1493
  • [28] An empirical analysis of the impact of software vulnerability announcements on firm stock price
    Telang, Rahul
    Wattal, Sunil
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2007, 33 (08) : 544 - 557
  • [29] Security Patterns From Intelligent Data: A Map of Software Vulnerability Analysis
    Sun Jinan
    Pan Kefeng
    Chen Xuefeng
    Zhang Junfu
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 18 - 25
  • [30] Correlation analysis of different vulnerability metrics on power grids
    Ouyang, Min
    Pan, Zhezhe
    Hong, Liu
    Zhao, Lijing
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 396 : 204 - 211