Systems Performance Modeling
eBook - ePub

Systems Performance Modeling

Adarsh Anand, Mangey Ram, Adarsh Anand, Mangey Ram

Share book
  1. 192 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Systems Performance Modeling

Adarsh Anand, Mangey Ram, Adarsh Anand, Mangey Ram

Book details
Book preview
Table of contents
Citations

About This Book

This book describes methods to improve software performance and safety using advanced mathematical and computational analytics. The main focus is laid on the increase of software reliability by preventive and predictive maintenance with efficient usage of modern testing resources. The editors collect contributions from international researchers in the field.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Systems Performance Modeling an online PDF/ePUB?
Yes, you can access Systems Performance Modeling by Adarsh Anand, Mangey Ram, Adarsh Anand, Mangey Ram in PDF and/or ePUB format, as well as other popular books in Technik & Maschinenbau & Automatisierung im Maschinenbau. We have over one million books available in our catalogue for you to explore.

Information

Publisher
De Gruyter
Year
2020
ISBN
9783110607635

1 Impact of available resources on software patch management

Adarsh Anand
University of Delhi, Operational Research, Room No 208, 110007, Delhi, India
Jasmine Kaur
University of Delhi, Operational Research, Room No 208, 110007, Delhi, India
Anu A. Gokhale
Illinois State University, USA
Mangey Ram
Graphic Era Deemed to be University Dehradun, Uttarakhand, India

Abstract

Software security has been an area of immense research as most of the things surrounding us are technology based. Much has been talked about vulnerabilities, their categories and types. Some studies elaborated and extended the available discovery models but few have considered the correction process in the same work. In this study, an approach to deal with software vulnerability through the release of patch/updates has been presented. The methodical work presented here discusses a mathematical model for optimal allocation of resources to remove vulnerabilities through an update.
Keywords: severity, software patch, software security, software updates, vulnerability, vulnerability correction model,

1.1 Introduction

Software security is a matter of grave concern, and the need for secure software has been stressed upon enough. The first half of the year 2019 had already seen 3,800 cases of publicly disclosed software breaches and 4.1 billion records exposed [1]. With the hacking tools getting more and more advanced, it is a tough fight to keep the system safe from the intruders. Even minor loopholes or oversights leave the software highly vulnerable. Often, the exploited loopholes have a fix available, but due to lack of comprehension of the situation’s gravity, they are never plugged. Such faults or glitches in the system architecture, design, code or implementation that compromises the software’s security are termed as software vulnerabilities. The most common vulnerabilities are caused by memory safety violations, input validation error, privilege confusion bugs, privilege escalation, race conditions, side channel attack, and user interface failure. The most common types of vulnerabilities are SQL injection, command injection, buffer overflow, uncontrolled format string, integer overflow, cross-site scripting, and so on. The software vulnerabilities are also categorized on the basis of the extent of damage their presence or exploitability causes. The Common Vulnerabilities and Exposures (CVE) database provides a Common Vulnerability Scoring System (CVSS) score to the reported vulnerabilities known as the severity index on an ascending scale of 1 to 10 [2]. On the basis of severity score, vulnerabilities are categorized as low, medium, high, and critical. The vulnerability discovery process is modeled through Vulnerability Discovery Models (VDMs), which help quantify the vulnerabilities discovered and understand their detection behavior with time. The foremost software VDM was the Anderson’s thermodynamic model [3]. Rescorla [4] presented a linear and exponential trend in the vulnerability detection process. The Alhazmi-Malaiya model, an S-shaped, logistic VDM defined the three phases in the vulnerability discovery process as linear, learning, and saturation [5]. An effort-based model was proposed by Alhazmi and Malaiya [6] to m...

Table of contents