Redirigiendo al acceso original de articulo en 23 segundos...
Inicio  /  Informatics  /  Vol: 8 Par: 4 (2021)  /  Artículo
ARTÍCULO
TITULO

Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets

Ioannis Tsantilis    
Thomas K. Dasaklis    
Christos Douligeris and Constantinos Patsakis    

Resumen

Cybersecurity is a never-ending battle against attackers, who try to identify and exploit misconfigurations and software vulnerabilities before being patched. In this ongoing conflict, it is important to analyse the properties of the vulnerability time series to understand when information systems are more vulnerable. We study computer systems? software vulnerabilities and probe the relevant National Vulnerability Database (NVD) time-series properties. More specifically, we show through an extensive experimental study based on the National Institute of Standards and Technology (NIST) database that the relevant systems software time series present significant chaotic properties. Moreover, by defining some systems based on open and closed source software, we compare their chaotic properties resulting in statistical conclusions. The contribution of this novel study is focused on the prepossessing stage of vulnerabilities time series forecasting. The strong evidence of their chaotic properties as derived by this research effort could lead to a deeper analysis to provide additional tools to their forecasting process.

 Artículos similares

       
 
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f... ver más
Revista: Applied Sciences

 
Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán and Patricia Acosta-Vargas    
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services a... ver más
Revista: Informatics

 
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis    
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ... ver más
Revista: Information

 
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles    
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi... ver más
Revista: Applied Sciences

 
Liang Chen, Xingrong Lu, Daping Deng, Mehdi Kouhdarag and Yimin Mao    
Our study focuses on the dynamic transient analysis of arched beam bridges over rivers, which face unique geohazards and challenges, including vibrations and dynamic loads that can affect structural integrity. The finite element software ANSYS v. 19.3 wa... ver más
Revista: Water