z-logo
open-access-imgOpen Access
How to build a vulnerability benchmark to overcome cyber security attacks
Author(s) -
Akram Junaid,
Ping Luo
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2018.5647
Subject(s) - computer security , vulnerability management , computer science , exploit , secure coding , vulnerability (computing) , tracing , security bug , trace (psycholinguistics) , software security assurance , source code , code (set theory) , software , field (mathematics) , the internet , benchmark (surveying) , key (lock) , set (abstract data type) , vulnerability assessment , information security , world wide web , security service , operating system , geodesy , philosophy , mathematics , psychological resilience , psychotherapist , linguistics , psychology , programming language , pure mathematics , geography
Cybercrimes are on a dramatic rise worldwide. The crime rate is growing day by day in every field or department which is directly or indirectly connected to the internet including Government, business or any individual. The main objective of this study is to evaluate the vulnerabilities in different software systems at the source code level by tracing their patch files. The authors have collected the source code of different types of vulnerabilities at a different level of granularities. They have proposed different ways to collect or trace the vulnerability code, which can be very helpful for security experts, organisations and software developers to maintain security measures. By following their proposed method, you can build your own vulnerability data‐set and can detect vulnerabilities in any system by using suitable code clone detection technique. The study also includes a discussion of reasons for the rise in cybercrimes including zero‐day exploits. A case study has been discussed with results and research questions to show the effectiveness of this study. This study concludes with the effective key findings of published and non‐published vulnerabilities and the ways to prevent from different security attacks to overcome cybercrimes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here