To obtain access to full text of journal and articles you must register!
- Article name
- Modern trends in exploiting vulnerabilities of automated information systems
- Authors
- Konovalenko S. A., , konovalenko_rcf@mail.ru, Krasnodar Higher Military School named after Army General S. M. Shtemenko, Krasnodar, Russia
Vasilyev D. S., , angrycloud@mail.ru, Krasnodar Higher Military School named after General of the Army S. M. Shtemenko, Krasnodar, Russia
- Keywords
- computer attack / vulnerability / exploit
- Year
- 2025 Issue 3 Pages 8 - 13
- Code EDN
- OGBGNH
- Code DOI
- 10.52190/2073-2600_2025_3_8
- Abstract
- This study examines the prevalence of computer attack methods and the distribution of vulnerabilities in automated information systems, analyzing data by the year of publication. The study compares the time required to exploit and patch vulnerabilities in automated information systems. The study highlights the possibility of exploiting vulnerabilities in automated information systems without direct access to their components by attackers. The study concludes that the most effective approach to preventing the exploitation of vulnerabilities in automated information systems is the process of developing and using exploits. The study identifies a gap between the number of exploit tools used to confirm the exploitability of vulnerabilities in automated information systems and the number of known vulnerabilities, newly discovered vulnerabilities, and zero-day vulnerabilities. The study concludes that the development and use of test (demonstration) impacts (exploits) against automated information systems is necessary.
- Text
- BUY for read the full text of article
- Buy
- 500.00 rub