作者: Michael P. Collins , Carrie Gates , Gaurav Kataria
DOI:
关键词: Exploit 、 Computer science 、 File sharing 、 Service (systems architecture) 、 Computer security
摘要: We segregate attacks into two categories – targeted and opportunistic based on whether the attacker compromises a specific target (targeted) or number of intermediate targets to fulfill his end goal (opportunistic). assume that attackers consider indistinguishable except for their vulnerabilities, are interested in acquiring as many possible. therefore hypothesize will develop involving services which have largest potential targets. test this hypothesis limited way by correlating worm releases P2P file sharing networks with users being targeted. Our results demonstrate relationship exists only variants worms not new worms. further service specific, there is no general model represents entire vector.