Analysis of software vulnerability classification based on different technical parameters

被引:11
|
作者
Garg, Shivi [1 ]
Singh, R. K. [1 ]
Mohapatra, A. K. [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Informat Technol Dept, New Delhi, India
来源
INFORMATION SECURITY JOURNAL | 2019年 / 28卷 / 1-2期
关键词
Malicious; malware; software; security; taxonomy; vulnerability; EMBEDDED SYSTEMS SECURITY; ATTACK; MODEL;
D O I
10.1080/19393555.2019.1628325
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive analysis of software vulnerabilities based on different technical parameters. The taxonomy of vulnerabilities presented here offers an insight into their frequency; susceptibility; correlation with instances or events, exploits, and artifacts; and assessment of the successful countermeasures. Furthermore, this paper presents the current state-of-the-art in the domain of software threats and vulnerabilities. In addition, it highlights various methods for identification of different types of vulnerabilities. These methods have their own advantages, associated costs, and inherent risks. The current work would help analyze various threats that a system could face, and subsequently it could guide the security engineer to take quick and cost-effective countermeasures.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [41] A software process that accelerates the comprehension of web-based technical articles
    Chang, PH
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON WEB-BASED EDUCATION, 2006, : 291 - 295
  • [42] Automating Technical Reviews in Software Forges and Repositories Based on Linked Data
    Manuel Dodero, Juan
    Ruiz-Rube, Ivan
    Traverso, Ignacio
    METADATA AND SEMANTICS RESEARCH, MTSR 2014, 2014, 478 : 30 - 41
  • [43] Analysis of the parameters of the ejaculate in the laboratory Wistar rat: technical description
    Angelica Lucio, Rosa
    Luis Tlachi, Jose
    Adriana Lopez, Aurora
    Zempoalteca, Rene
    Velazquez-Moctezuma, Javier
    VETERINARIA MEXICO, 2009, 40 (04): : 405 - 415
  • [44] Geophysical investigation of groundwater potential, aquifer parameters, and vulnerability: a case study of Enugu State College of Education (Technical)
    Oguama, Bethrand Ekwundu
    Ibuot, Johnson Cletus
    Obiora, Daniel Nnaemeka
    Aka, Mfoniso Udofia
    MODELING EARTH SYSTEMS AND ENVIRONMENT, 2019, 5 (03) : 1123 - 1133
  • [45] Geophysical investigation of groundwater potential, aquifer parameters, and vulnerability: a case study of Enugu State College of Education (Technical)
    Bethrand Ekwundu Oguama
    Johnson Cletus Ibuot
    Daniel Nnaemeka Obiora
    Mfoniso Udofia Aka
    Modeling Earth Systems and Environment, 2019, 5 : 1123 - 1133
  • [46] Seismic vulnerability assessment to slight damage based on experimental modal parameters
    Michel, C.
    Gueguen, P.
    Causse, M.
    EARTHQUAKE ENGINEERING & STRUCTURAL DYNAMICS, 2012, 41 (01): : 81 - 98
  • [47] Vulnerability Assessment of the Urban Rail Transit Network Based on Travel Behavior Analysis
    Liu, Bing
    Zhu, Guangyu
    Li, Xiaolu
    Sun, Ranran
    IEEE ACCESS, 2021, 9 : 1407 - 1419
  • [48] PSA based vulnerability and protectability analysis for NPPs
    Gopika, V.
    Rao, V. V. S. Sanyasi
    Ghosh, A. K.
    Kushwaha, H. S.
    ANNALS OF NUCLEAR ENERGY, 2012, 50 : 232 - 237
  • [49] Analysis of Body Communication Parameters Using Software Radio Platform
    Jeon, Seokseong
    Yu, Chansu
    Suh, Young-Joo
    Moon, Jin-hee
    Lee, Sang-Hoon
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 628 - 633
  • [50] Prioritization-Based Taxonomy of Global Software Development Challenges: A FAHP Based Analysis
    Akbar, Muhammad Azeem
    Alsanad, Ahmed
    Mahmood, Sajjad
    Alothaim, Abdulrahman
    IEEE ACCESS, 2021, 9 : 37961 - 37974