Handling Undiscovered Vulnerabilities Using a Provenance Network
This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain uncovered during the testing phase of a system's development lifecycle. The combination of predicted usage patterns, a Provenance network model and a clustering methodology provide a secure failur...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Institute of Informatics and Cybernetics
2009-06-01
|
Series: | Journal of Systemics, Cybernetics and Informatics |
Online Access: | http://www.iiisci.org/Journal/CV$/sci/pdfs/KS891IU.pdf
|