eBook - ePub
Systems Performance Modeling
Adarsh Anand, Mangey Ram, Adarsh Anand, Mangey Ram
This is a test
Share book
- 192 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Systems Performance Modeling
Adarsh Anand, Mangey Ram, Adarsh Anand, Mangey Ram
Book details
Book preview
Table of contents
Citations
About This Book
This book describes methods to improve software performance and safety using advanced mathematical and computational analytics. The main focus is laid on the increase of software reliability by preventive and predictive maintenance with efficient usage of modern testing resources. The editors collect contributions from international researchers in the field.
Frequently asked questions
How do I cancel my subscription?
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlegoâs features. The only differences are the price and subscription period: With the annual plan youâll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Systems Performance Modeling an online PDF/ePUB?
Yes, you can access Systems Performance Modeling by Adarsh Anand, Mangey Ram, Adarsh Anand, Mangey Ram in PDF and/or ePUB format, as well as other popular books in Technik & Maschinenbau & Automatisierung im Maschinenbau. We have over one million books available in our catalogue for you to explore.
Information
1 Impact of available resources on software patch management
Adarsh Anand
University of Delhi, Operational Research, Room No 208, 110007, Delhi, India
Jasmine Kaur
University of Delhi, Operational Research, Room No 208, 110007, Delhi, India
Anu A. Gokhale
Illinois State University, USA
Mangey Ram
Graphic Era Deemed to be University Dehradun, Uttarakhand, India
Abstract
Software security has been an area of immense research as most of the things surrounding us are technology based. Much has been talked about vulnerabilities, their categories and types. Some studies elaborated and extended the available discovery models but few have considered the correction process in the same work. In this study, an approach to deal with software vulnerability through the release of patch/updates has been presented. The methodical work presented here discusses a mathematical model for optimal allocation of resources to remove vulnerabilities through an update.
Keywords: severity, software patch, software security, software updates, vulnerability, vulnerability correction model,
1.1 Introduction
Software security is a matter of grave concern, and the need for secure software has been stressed upon enough. The first half of the year 2019 had already seen 3,800 cases of publicly disclosed software breaches and 4.1 billion records exposed [1]. With the hacking tools getting more and more advanced, it is a tough fight to keep the system safe from the intruders. Even minor loopholes or oversights leave the software highly vulnerable. Often, the exploited loopholes have a fix available, but due to lack of comprehension of the situationâs gravity, they are never plugged. Such faults or glitches in the system architecture, design, code or implementation that compromises the softwareâs security are termed as software vulnerabilities. The most common vulnerabilities are caused by memory safety violations, input validation error, privilege confusion bugs, privilege escalation, race conditions, side channel attack, and user interface failure. The most common types of vulnerabilities are SQL injection, command injection, buffer overflow, uncontrolled format string, integer overflow, cross-site scripting, and so on. The software vulnerabilities are also categorized on the basis of the extent of damage their presence or exploitability causes. The Common Vulnerabilities and Exposures (CVE) database provides a Common Vulnerability Scoring System (CVSS) score to the reported vulnerabilities known as the severity index on an ascending scale of 1 to 10 [2]. On the basis of severity score, vulnerabilities are categorized as low, medium, high, and critical. The vulnerability discovery process is modeled through Vulnerability Discovery Models (VDMs), which help quantify the vulnerabilities discovered and understand their detection behavior with time. The foremost software VDM was the Andersonâs thermodynamic model [3]. Rescorla [4] presented a linear and exponential trend in the vulnerability detection process. The Alhazmi-Malaiya model, an S-shaped, logistic VDM defined the three phases in the vulnerability discovery process as linear, learning, and saturation [5]. An effort-based model was proposed by Alhazmi and Malaiya [6] to m...