Time Lag-Based Modelling for Software Vulnerability Exploitation Process

With the increase in the discovery of vulnerabilities, the expected exploits occurred in various software platform has shown an increased growth with respect to time. Only after being discovered, the potential vulnerabilities might be exploited. There exists a finite time lag in the exploitation process; from the moment the hackers get information about the discovery of a vulnerability and the time required in the final exploitation. By making use of the time lag approach, we have developed a framework for the vulnerability exploitation process that occurred in multiple stages. The time lag between the discovery and exploitation of a vulnerability has been bridged via the memory kernel function over a finite time interval. The applicability of the proposed model has been validated using various software exploit datasets.

https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6233

Adarsh Anand University of Delhi, India

Navneet Bhatt University of Delhi, India

Jasmine Kaur University of Delhi, India

Yoshinobu Tamura Tokyo City University, Japan

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *