首页> 外文会议>International symposium on engineering secure software and systems >POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities
【24h】

POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities

机译:POODLE,更多POODLE,FREAK攻击:服务器管理员如何应对三个严重的Web漏洞

获取原文

摘要

We present an empirical study on the patching characteristics of the top 100,000 web sites in response to three recent vulnerabilities: the POODLE vulnerability, the POODLE TLS vulnerability, and the FREAK vulnerability. The goal was to identify how the web responds to newly discovered vulnerabilities and the remotely observable characteristics of websites that contribute to the response pattern over time. Using open source tools, we found that there is a slow patch adoption rate in general; for example, about one in four servers hosting Alexa top 100,000 sites we sampled remained vulnerable to the POODLE attack even after five months. It was assuring that servers handling sensitive data were more aggressive in patching the vulnerabilities. However, servers that had more open ports were more likely to be vulnerable. The results are valuable for practitioners to understand the state of security engineering practices and what can be done to improve.
机译:我们针对前三个漏洞:POODLE漏洞,POODLE TLS漏洞和FREAK漏洞,对前100,000个网站的修补特性进行了实证研究。目的是确定网络如何响应新发现的漏洞以及随着时间的推移对响应模式有所贡献的网站的远程可观察特征。使用开源工具,我们发现一般而言补丁的采用速度很慢。例如,即使在五个月后,托管抽样的Alexa前十万个站点中,大约有四分之一的服务器仍然容易受到POODLE攻击。它确保处理敏感数据的服务器在修补漏洞方面更具攻击性。但是,具有更多开放端口的服务器更容易受到攻击。这些结果对于从业人员了解安全工程实践的状态以及可以采取的改进措施非常有价值。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号