2021
DOI: 10.1016/j.jnca.2021.103230
|View full text |Cite
|
Sign up to set email alerts
|

Detecting the impact of software vulnerability on attacks: A case study of network telescope scans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 30 publications
0
1
0
Order By: Relevance
“…In [16], the authors studied the impact of vulnerabilities on the volume of scans. They designed machine learning models to predict the impact of vulnerabilities, and they show that, by leveraging a set of features characterizing a vulnerability, they can accurately predict whether or not it will imply an increase in the volume of scans after its disclosure.…”
Section: Related Workmentioning
confidence: 99%
“…In [16], the authors studied the impact of vulnerabilities on the volume of scans. They designed machine learning models to predict the impact of vulnerabilities, and they show that, by leveraging a set of features characterizing a vulnerability, they can accurately predict whether or not it will imply an increase in the volume of scans after its disclosure.…”
Section: Related Workmentioning
confidence: 99%
“…Analysing of these four dimensions, the real overseas attacks can be identified and the credibility of attack data can be improved. By observation, the real attack form on the sensing system are mainly SQL injection, XSS attack [9, 11], network scanning [4], sensitive information disclosure, host detection, file upload, permission bypass, directory traversal and so on [12]. It is notice that the high efficiency of security tactics contains effectiveness, fast convergence, and low error blocking rate.…”
Section: Introductionmentioning
confidence: 99%