Functionality Meets Terminology to Address Network Security Vulnerabilities

نویسنده

  • Greg Goth
چکیده

In 1999, when most of the computer industry’s cautionary buzz centered on finding and fixing Y2K flaws, a small group of MITRE engineers began work on the Common Vulnerabilities and Exposures dictionary. Prior to CVE, no standard nomenclature existed for network security holes. In fact, the security landscape was rife with different names for the same vulnerability, as vendors strove to differentiate themselves from competitors. As a result, network administrators often found themselves performing redundant searches for the same shortcoming, wasting time and effort.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proactive Web Server Protocol for Complaint Assessment

Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-Release the software should be thoroughly tested for not only functionality reliability, but should be tested for the security flaws (or) vulner...

متن کامل

Manipulating Program Functionality to Eliminate Security Vulnerabilities

Security vulnerabilities can be seen as excess undesirable functionality present in a software system. We present several mechanisms that can either excise or change system functionality in ways that may 1) eliminate security vulnerabilities while 2) enabling the system to continue to deliver acceptable service.

متن کامل

k-Zero Day Safety: A Network Security Metric for

By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security metrics has been hindered by difficulties in handling zero day attacks exploiting unknown vulnerabilities. In fact, the security ris...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

IPv6 Security: Attacks and Countermeasures in a Nutshell

The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit Internet addresses. IPv6 was invented to overcome the latter as well as to revise other drawbacks and security vulnerabilities of its predecessor IPv4. Initially considered the savior in terms of security because of its mandatory IPsec support, it turned out not to be the panacea it was thought to be. O...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Distributed Systems Online

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2006