首页> 外文会议>International Conference of Smart Systems and Emerging Technologies >DoS Attacks, Triad and Privacy: Software Exposures in Microsoft, Apple and Google
【24h】

DoS Attacks, Triad and Privacy: Software Exposures in Microsoft, Apple and Google

机译:DOS攻击,三合会和隐私:微软,苹果和谷歌的软件风险

获取原文

摘要

Internet age thrives on connectivity features and accessibility options, while denial of services attacks are detrimental to accessibility. In this context our research is making use of software exposures datasets from National Institute of Standards and Technology for analysis of denial of services (DoS) exposure of various products of three major vendors named as Microsoft (MS), Apple (AP) and Google (GO). A non-linear logit regression model has been used to force binary predictions for variety of DoS related vulnerabilities, given the values of independent variables established through the odd ratios of dependent variables including accessibility type, complexity and scores of attacks, authenticity level as well as confidentiality, accessibility and/or integrity violations. Interesting results compares and contrasts three vendors. Availability has bigger effects for two vendors (MS and AP) but not for GO in case of dependent variable DoS as well for all three vendors for dependent variable of (DoS +Info) vulnerability type which is also heavily influenced by Confidentiality in all three vendors, although impact on MS for both these independent variables on both of these dependent variables are too high as compared to other two vendors. Other heavy affects have been noted on (DoS +Priv) from Access and Integrity for MS and confidentiality for GO, on DoS Mem. Corr. from availability and on DoS Exec Code Overflow Mem. Corr. from complexity both for AP.
机译:互联网时代在连接功能和可访问性选项上蓬勃发展,而拒绝服务攻击对可访问性有害。在这方面,我们的研究正在利用来自国家标准和技术研究所的软件风险数据集,以分析拒绝服务(DOS)曝光的三个主要供应商的拒绝服务(MS),Apple(AP)和Google(走)。对于通过奇数变量的奇数比率建立的独立变量的值包括可访问类型,复杂性和攻击,真实性和分数,以及攻击,真实性水平以及真实性水平以及机密性,可访问性和/或诚信违规。有趣的结果比较和对比三家供应商。可用性对两个供应商(MS和AP)具有更大的效果,但不适用于依赖变量DOS的情况,以及所有三个供应商(DOS + INFO)漏洞类型的所有三个供应商,这在所有三个供应商中也受到机密性的影响,尽管与其他两个供应商相比,在这些从属变量中对这些独立变量的影响对于两个独立变量的影响太高。在DOS MEM上,从访问和完整性的访问和完整性都注意到(DOS + PRIV)上注意到了其他繁重的影响。腐蚀。从可用性和DOS EXEC代码溢出MEM。腐蚀。来自AP的复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号