Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of South Florida

USF Tampa Graduate Theses and Dissertations

Statistics and Probability

Markov Model

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya Jun 2017

Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya

USF Tampa Graduate Theses and Dissertations

Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related studies. Vulnerability Life Cycle discussed by S. Frei and studies by several other scholars have noted the importance of this approach. Application of Statistical Methodologies in Cybersecurity related studies call for a greater deal of new information. Using currently available data from National Vulnerability Database this study develops and presents a set of useful Statistical tools to be applied in Cybersecurity related decision making processes.

In the present study, the concept of Vulnerability Space is defined as a probability space. Relevant theoretical analyses are conducted and …


Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi Jun 2017

Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi

USF Tampa Graduate Theses and Dissertations

Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are inseparably interconnected. Our effort in this study mainly focuses on developing useful …