Assessment of Windows system security using vulnerability relationship graph

被引:0
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Heilongjiang, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS | 2005年 / 3802卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To evaluate the security situation of Windows systems for different users on different security attributes, this paper proposes a quantitative assessment method based on vulnerability relationship graph (VRG) and an index-based assessment policy. Through introducing the correlative influences of vulnerabilities, VRG can be used to scientifically detect high risk vulnerabilities which can evoke multistage attacks although their threats on surface are very little. Analysis of 1085 vulnerabilities indicates that for trusted remote visitors, the security of Windows systems is lower while for distrusted remote visitors, they are relatively secure. But there is no obvious difference of the security risk on confidentiality, authenticity and availability of Windows systems. In several known versions, the security of Windows NT is almost lowest.
引用
收藏
页码:415 / 420
页数:6
相关论文
共 50 条
  • [21] RFID System Security Assessment Methodology Based on Attack Graph Model
    Yang, Xiaoming
    Wang, Jiahao
    Huang, Yifu
    Qin, Zhiguang
    PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166
  • [22] Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System
    Doynikova, Elena
    Chechulin, Andrey
    Kotenko, Igor
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 53 - 61
  • [23] Assessment of power system security using Security Information Index
    Manickavasagam, Krishnan
    Prasad, Belur Krishna Swathi
    Ramasangu, Hariharan
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2019, 13 (14) : 3040 - 3047
  • [24] Home Health Care vulnerability assessment using graph theory and matrix methods
    Barkaoui, H.
    Guinet, A.
    Wang, T.
    IFAC PAPERSONLINE, 2017, 50 (01): : 4623 - 4629
  • [25] Vulnerability assessment of a new class of Cayley graph
    Zhang, Hong
    Bian, Hong
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2025, 71 (01) : 969 - 982
  • [26] A Compact Vulnerability Knowledge Graph for Risk Assessment
    Yin, Jiao
    Hong, Wei
    Wang, Hua
    Cao, Jinli
    Miao, Yuan
    Zhang, Yanchun
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2024, 18 (08)
  • [27] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [28] Network security assessment using a semantic reasoning and graph based approach
    Wu, Songyang
    Zhang, Yong
    Cao, Wei
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 96 - 109
  • [29] Security Risk Assessment of Server Hardware Architectures using Graph Analysis
    Koteshwara, Sandhya
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [30] Vulnerability assessment of information system based on weighted directional graph and complex network technology
    1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):