A hybrid ranking approach to estimate vulnerability for dynamic attacks

被引:12
|
作者
Zhao, Feng [1 ,2 ,3 ]
Huang, Heqing [1 ]
Jin, Hai [1 ,2 ,3 ]
Zhang, Qin [1 ,2 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Serv Comp Technol & Syst Lab, Wuhan 430074, Peoples R China
[3] Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; Hybrid ranking; Attack graph; CVSS; Dynamic scenarios; SECURITY;
D O I
10.1016/j.camwa.2011.09.031
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
To enhance security in dynamic networks, it is important to evaluate the vulnerabilities and offer economic and practical patching strategy since vulnerability is the major driving force for attacks. In this paper, a hybrid ranking approach is presented to estimate vulnerabilities under the dynamic scenarios, which is a combination of low-level rating for vulnerability instances and high-level evaluation for the security level of the network system. Moreover, a novel quantitative model, an adapted attack graph, is also proposed to escaping isolated scoring, which takes the dynamic and logic relations among exploits into account, and significantly benefits to vulnerability analysis. To validate applicability and performance of our approach, a hybrid ranking case is implemented as experimental platform. The ranking results show that our approach differentiates the influential levels among vulnerabilities under dynamic attacking scenarios and economically enhances the security of network system. (C) 2011 Elsevier Ltd, All rights reserved.
引用
收藏
页码:4308 / 4321
页数:14
相关论文
共 50 条
  • [31] An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode
    Adachi, Takashi
    Omote, Kazumasa
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 145 - 151
  • [32] A Dynamic Approach to Estimate Receiving Bandwidth for WebRTC
    Iqbal, Razib
    Shirmohammadi, Shervin
    Atwah, Rasha
    INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2016, 7 (03): : 17 - 33
  • [33] Unmasking the Botnet Attacks: A Hybrid Deep Learning Approach
    Nayan, Pranta Nath
    Mahajabin, Maisha
    Rahman, Abdur
    Maisha, Nusrat
    Chowdhury, Md. Tanvir
    Uddin, Md. Mohsin
    Tuhin, Rashedul Amin
    Khan, M. Saddam Hossain
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 5, SMARTCOM 2024, 2024, 949 : 441 - 451
  • [34] Hybrid Approach to Detect SQLi Attacks and Evasion Techniques
    Makiou, Abdelhamid
    Begriche, Youcef
    Serhrouchni, Ahmed
    2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 452 - 456
  • [35] A Hybrid Approach to Defend against Adversarial Evasion Attacks
    Jung, Kuchul
    Woo, Jongseok
    Mukhopadhyay, Saibal
    2024 IEEE 67TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, MWSCAS 2024, 2024, : 919 - 922
  • [36] A Hybrid System Approach to Determine the Ranking of a Debutant Country in Eurovision
    Ochoa, Alberto
    Munoz-Zavala, Angel E.
    Hernandez-Aguirre, Arturo
    JOURNAL OF COMPUTERS, 2009, 4 (08) : 713 - 720
  • [37] Online-Review-Driven Products Ranking: A Hybrid Approach
    Qu, Shaojian
    Zhang, Yang
    Ji, Ying
    Wang, Zheng
    Geng, Ruijuan
    SYSTEMS, 2023, 11 (03):
  • [38] Soft Hybrid Filter Pruning using a Dual Ranking Approach
    Chen, Peng-Yu
    Yang, Jen-Chieh
    Wang, Sheng-De
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 2432 - 2439
  • [39] A Hybrid Approach to Combining CART and Logistic Regression for Stock Ranking
    Zhu, Min
    Philpotts, David
    Sparks, Ross
    Stevenson, Maxwell J.
    JOURNAL OF PORTFOLIO MANAGEMENT, 2011, 38 (01): : 100 - +
  • [40] A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks
    Kazemi, Zahra
    Safavi, Ali Akbar
    Naseri, Farshid
    Urbas, Leon
    Setoodeh, Peyman
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) : 7275 - 7286