Detecting the impact of software vulnerability on attacks: A case study of network telescope scans.
Abdellah HoumzGhita MezzourKarim ZkikMounir GhoghoHouda BenbrahimPublished in: J. Netw. Comput. Appl. (2021)
Keyphrases
- buffer overflow
- security risks
- traffic analysis
- security vulnerabilities
- ddos attacks
- security threats
- attack graphs
- dos attacks
- denial of service
- software development
- test cases
- peer to peer
- data flow
- network structure
- complex networks
- network traffic
- network services
- wireless sensor networks
- software components
- risk assessment
- watermarking scheme
- web services
- communication networks
- computer networks
- software systems
- intrusion detection
- software engineering
- case study