Handling Undiscovered Vulnerabilities Using a Provenance Network

This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain uncovered during the testing phase of a system's development lifecycle. The combination of predicted usage patterns, a Provenance network model and a clustering methodology provide a secure failur...

Full description

Bibliographic Details
Main Authors: Amrit'anshu Thakur, Rayford Vaughn, Valentine Anantharaj
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2009-06-01
Series:Journal of Systemics, Cybernetics and Informatics
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/KS891IU.pdf