Book contents
- Frontmatter
- Contents
- Foreword
- Preface
- 1 Introduction
- 2 Background
- Part I Understanding the Behavior of Malicious Hackers
- Part II Predicting Imminent Cyber-Threats
- 6 Identifying Exploits in theWild Proactively
- 7 Predicting Enterprise-Targeted External Cyber-attacks
- 8 Bringing Social Network Analysis to Aid in Cyber-attack Prediction
- 9 Finding At-Risk Systems without Software Vulnerability Identifiers (CVEs)
- 10 Final Considerations
- References
- Index
6 - Identifying Exploits in theWild Proactively
from Part II - Predicting Imminent Cyber-Threats
Published online by Cambridge University Press: 09 April 2021
- Frontmatter
- Contents
- Foreword
- Preface
- 1 Introduction
- 2 Background
- Part I Understanding the Behavior of Malicious Hackers
- Part II Predicting Imminent Cyber-Threats
- 6 Identifying Exploits in theWild Proactively
- 7 Predicting Enterprise-Targeted External Cyber-attacks
- 8 Bringing Social Network Analysis to Aid in Cyber-attack Prediction
- 9 Finding At-Risk Systems without Software Vulnerability Identifiers (CVEs)
- 10 Final Considerations
- References
- Index
Summary
![Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'](https://static.cambridge.org/content/id/urn%3Acambridge.org%3Aid%3Abook%3A9781108869003/resource/name/firstPage-9781108491594c6_77-107.jpg)
- Type
- Chapter
- Information
- Exploring Malicious Hacker CommunitiesToward Proactive Cyber-Defense, pp. 77 - 107Publisher: Cambridge University PressPrint publication year: 2021