2020
DOI: 10.3390/app10072555
|View full text |Cite
|
Sign up to set email alerts
|

Better Not to Use Vulnerability’s Reference for Exploitability Prediction

Abstract: About half of all exploit codes will become available within about two weeks of the release date of its vulnerability. However, 80% of the released vulnerabilities are never exploited. Since putting the same effort to eliminate all vulnerabilities can be somewhat wasteful, software companies usually use different methods to assess which vulnerability is more serious and needs an immediate patch. Recently, there have been some attempts to use machine learning techniques to predict a vulnerability’s exploitabili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 10 publications
0
5
0
1
Order By: Relevance
“…Few of the existing vulnerabilities are exploited by attackers [18]. This rate is about 20% of all software vulnerabilities [7]. This situation clearly shows us the advantage of being able to anticipate the deficits that merit focus.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Few of the existing vulnerabilities are exploited by attackers [18]. This rate is about 20% of all software vulnerabilities [7]. This situation clearly shows us the advantage of being able to anticipate the deficits that merit focus.…”
Section: Introductionmentioning
confidence: 99%
“…CVE lists are used by many academic and empirical studies [5,6]. Half of the exploits that took place occurred within two weeks of posting the vulnerabilities [7]. This shows the importance of quickly analyzing security vulnerabilities and accurately determining their severity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Yang vd. (Yang et al 2020), istismar kodlarının yaklaşık yarısının güvenlik açığının ilanından iki hafta içerisinde kullanıldığı açıklamıştır. Bunun yanında ilan edilen açıların sadece %20'sinin istismara maruz kaldığı belirtilmektedir.…”
Section: Introductionunclassified
“…Furthermore, due to the ongoing Covid-19 pandemic [1] and related increased use of internet services, the cybersecurity issues have the potential to affect a much larger, than in previous years, part of the human population. Consequently, the identification and prioritization of vulnerabilities becomes a critical issue for a company that offers internet services [1,2].…”
Section: Introductionmentioning
confidence: 99%