@ARTICLE{Hoffmann_Romuald_Markov_2021, author={Hoffmann, Romuald}, volume={vol. 67}, number={No 1}, journal={International Journal of Electronics and Telecommunications}, pages={35-41}, howpublished={online}, year={2021}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.}, type={Article}, title={Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability}, URL={http://journals.pan.pl/Content/118862/PDF/5_2676_Hoffmann_sk.pdf}, doi={10.24425/ijet.2021.135941}, keywords={Markov model, cyber-attack, vulnerability, life cycle, homogenous continuous time Markov chain}, }