Assessment of Windows system security using vulnerability relationship graph

被引:0
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Heilongjiang, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS | 2005年 / 3802卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To evaluate the security situation of Windows systems for different users on different security attributes, this paper proposes a quantitative assessment method based on vulnerability relationship graph (VRG) and an index-based assessment policy. Through introducing the correlative influences of vulnerabilities, VRG can be used to scientifically detect high risk vulnerabilities which can evoke multistage attacks although their threats on surface are very little. Analysis of 1085 vulnerabilities indicates that for trusted remote visitors, the security of Windows systems is lower while for distrusted remote visitors, they are relatively secure. But there is no obvious difference of the security risk on confidentiality, authenticity and availability of Windows systems. In several known versions, the security of Windows NT is almost lowest.
引用
收藏
页码:415 / 420
页数:6
相关论文
共 50 条
  • [31] Cyber Security Vulnerability Assessment for Smart Substations
    Chai Jiwen
    Liu Shanmei
    2016 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2016, : 1368 - 1373
  • [32] Cyber security vulnerability assessment of power industry
    Yu, Jiaxi
    Mao, Anjia
    Guo, Zhizhong
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1379 - +
  • [33] Cyber/Physical Security Vulnerability Assessment Integration
    MacDonald, Doug
    Clements, Samuel L.
    Patrick, Scott W.
    Perkins, Casey
    Muller, George
    Lancaster, Mary J.
    Hutton, Will
    2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,
  • [34] The concept of vulnerability in security assessment of chemical plants
    Zhao, Dongfeng, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06):
  • [35] Security Vulnerability Assessment for Software Version Upgrade
    Treetippayaruk, Sirikwan
    Senivongse, Twittie
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 283 - 289
  • [36] Vulnerability assessment of cyber security in power industry
    Yu Jiaxi
    Mao Anjia
    Guo Zhizhong
    2006 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION. VOLS 1-5, 2006, : 2200 - +
  • [37] Android Security Assessment Based on Reported Vulnerability
    Sugiono, Eko
    Asnar, Yudistira
    Liem, Inggriani
    2014 International Conference on Data and Software Engineering (ICODSE), 2014,
  • [38] Integrated software vulnerability and security functionality assessment
    Wang, Xiangrong
    Shi, Hang
    Huang, Tze-Yau William
    Lin, Frank C.
    ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2007, : 103 - +
  • [39] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [40] Attack Graph-Based Quantitative Assessment for Industrial Control System Security
    Zhang, Yaofang
    Wang, Bailing
    Wu, Chenrui
    Wei, Xiaojie
    Wang, Zibo
    Yin, Guohua
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753