...
首页> 外文期刊>Performance evaluation review >Investigation of the 2016 Linux TCP Stack Vulnerability at Scale
【24h】

Investigation of the 2016 Linux TCP Stack Vulnerability at Scale

机译:大规模调查2016 Linux TCP堆栈漏洞

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

In this work we analyzed the impact of the recent challenge ACK vulnerability in Linux kernel, including (1) who was initially vulnerable, (2) patching behavior over time, by hosting services, and by network services (3) how notification affects the patching behavior. In general, we find that many in the top websites were vulnerable and remain vulnerable for an extended period of time. We find that the hosting services behind many of the top websites in fact have a surprisingly diverse and sometimes opposite patching behavior. We show that Linux kernel patching has some interesting differences from the recent Heartbleed and the Debian weak key event. The lessons and data collected will hopefully help the community better react to future Internet-wide security events.
机译:在这项工作中,我们分析了Linux内核中最新挑战ACK漏洞的影响,其中包括(1)最初是谁易受攻击,(2)随着时间的推移,通过托管服务以及网络服务进行的修补行为(3)通知如何影响修补行为。总的来说,我们发现许多顶级网站都容易受到攻击,并且在很长一段时间内仍会受到攻击。我们发现许多顶级网站背后的托管服务实际上具有令人惊讶的多样化,有时甚至是相反的修补行为。我们显示Linux内核补丁与最近的Heartbleed和Debian弱密钥事件有一些有趣的区别。收集的经验教训和数据有望帮助社区更好地应对未来的Internet范围的安全事件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号