Skip a heartbeat: OpenSSL Heartbleed Vulnerability & Prediction of Exploitation by Mehak Bashir - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

TABLE OF CONTENTS

 

Topic

LIST OF FIGURES

LIST OF TABLES

ABSTRACT

 

CHAPTER 1 INTRODUCTION

1.1 OpenSSL Heartbleed

1.2 Naive Bayes Classifier

1.3 Vulnerability

1.4 Types of Vulnerabilities

 

CHAPTER 2 LITERATURE SURVEY

2.1 Introduction to Survey Report

2.2 General Survey

 

CHAPTER 3 THEORETICAL EXPLAINATIONS

3.1 How the Heartbeat Works

3.2 Data Leakage Leading to Heartbleed

3.3 Code Fix

3.4 Real world Impact of Heartbleed

3.5 Factors to Determine Severity of a Vulnerability- Common Vulnerability Scoring System (CVSS)

3.6 Naive Bayes Classification

 

CHAPTER 4 PROPOSED WORK

4.1 Algorithm for Predicting severity/Threat of Exploitation Using Naïve Bayes Approach

4.2 Frequency Table for Some Common Vulnerabilities Based on CVSS (Version 2) parameters

4.3 Likelihood Table for Finding the Probabilities of Various CVSS (Version2) Parameters

4.4 Using Naive Bayes Equation to Calculate the Posterior Probability for a Sample class of Vulnerability, to predict its Severity

CHAPTER 5 RESULTS AND OUTPUTS

5.1 Checking Heartbleed Vulnerability with nmap in Kali Linux

5.2 Exploiting Heartbleed Vulnerability with Metasploit

5.3 Output of Naive Bayes Method for Prediction of Severity of Exploitation for OpenSSL Heartbleed Vulnerability

5.4 C# Code Segments for Predicting Severity/Threat of Exploitation Using Naive Bayes Approach

 

CHAPTER 6 CONCLUSION AND RECOMMENDATIONS

6.1 Conclusions

6.2 Recommendations

 

CERTIFICATE OF PUBLICATION

REFERENCES

 

LIST OF FIGURES

S.No.

Title

Figure 0

Graphic 1 and 2 shows the Heartbleed code

Figure 1

Memory Leak

Figure 2

The OpenSSL code fix for the Heartbleed bug

Figure 3

OpenSSL Security Advisory

Figure 4

Exploiting the Heartbleed Vulnerability

 

LIST OF TABLES

S.No.

Title

Table 1

CVSS (Version 2) Base Metrics, with definitions from Mell et al. (2007)

Table 2

Frequency table for some common vulnerabilities using CVSS (Version 2) Base Metrics

Table 3

Likelihood table for calculation of probabilities of CVSS ( Version 2) Parameters