The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objective: This paper aims to analyze the top ten vulnerabilities present in the Linux kernel and to classify them into different classes based on security metrics. Methods/Statistical Analysis: Comparative evaluation of different tree based, Bayesian and instance based classifiers w.r.t. three security metrics integrity impact, confidentiality impact and availability impact are presented. The performance of these classifiers is evaluated on the basis of accuracy. Findings: All classifiers are showing highest accuracy in terms of integrity. It is very critical security metrics as it is directly proportional to vulnerability score. Application: Accurately classifying integrity will help in making the system more secure and vulnerable proof.

Keywords

Linux kernel vulnerabilities, Classifiers, Availability, Integrity, Confidentiality
User