2009 International Conference on Software Testing Verification and Validation 2009
DOI: 10.1109/icst.2009.9
|View full text |Cite
|
Sign up to set email alerts
|

Seasonal Variation in the Vulnerability Discovery Process

Abstract: (Windows NT, XP, 2000, Server 2003, MAC OS X, HP-UX, Solaris, Red Hat Linux, IIS, Apache, Internet Explorer and Firefox) shows that there is indeed an annual seasonal pattern. While all the programs exhibit a year-end peak, a higher incidence is also observed during the mid-year months for Microsoft products.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…5.1), and, in turn, to impossibility to make a meaningful short-term forecast. To conclude, application of approach presented in [4] lead to negative results while our approach helped to resolve this problem.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…5.1), and, in turn, to impossibility to make a meaningful short-term forecast. To conclude, application of approach presented in [4] lead to negative results while our approach helped to resolve this problem.…”
Section: Discussionmentioning
confidence: 99%
“…This task helps to provide an indirect estimation of reliability of a given software solution. Such research work was partially performed in [4] though the authors just made a seasonal analysis of vulnerability discovery process concluding that a forecasting is intended to be their future work.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, Joh and Malaiya (2009) proposed a study on the seasonal variation in the process of security vulnerability discovery of software. The authors' idea was to investigate the National Vulnerability Database (NVD) between 1995 and 2007 and discover at what time of year vulnerability discovery rates were higher, detecting possible causes.…”
Section: Introductionmentioning
confidence: 99%
“…Software attackers or crackers create malware that take advantage of security vulnerabilities, thereby compromising IT systems and leading to data loss, unauthorized access of confidential information by intruders, IT system user inaccessibility, etc. [1] Software security vulnerability is explained as a flaw within an IT system that causes the system to work irregularly and contrary to its designated purpose [7] . Malware issues could extend to causing a system to violate its designed security policy.…”
Section: Introductionmentioning
confidence: 99%