A hybrid ranking approach to estimate vulnerability for dynamic attacks

被引:12
|
作者
Zhao, Feng [1 ,2 ,3 ]
Huang, Heqing [1 ]
Jin, Hai [1 ,2 ,3 ]
Zhang, Qin [1 ,2 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Serv Comp Technol & Syst Lab, Wuhan 430074, Peoples R China
[3] Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; Hybrid ranking; Attack graph; CVSS; Dynamic scenarios; SECURITY;
D O I
10.1016/j.camwa.2011.09.031
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
To enhance security in dynamic networks, it is important to evaluate the vulnerabilities and offer economic and practical patching strategy since vulnerability is the major driving force for attacks. In this paper, a hybrid ranking approach is presented to estimate vulnerabilities under the dynamic scenarios, which is a combination of low-level rating for vulnerability instances and high-level evaluation for the security level of the network system. Moreover, a novel quantitative model, an adapted attack graph, is also proposed to escaping isolated scoring, which takes the dynamic and logic relations among exploits into account, and significantly benefits to vulnerability analysis. To validate applicability and performance of our approach, a hybrid ranking case is implemented as experimental platform. The ranking results show that our approach differentiates the influential levels among vulnerabilities under dynamic attacking scenarios and economically enhances the security of network system. (C) 2011 Elsevier Ltd, All rights reserved.
引用
收藏
页码:4308 / 4321
页数:14
相关论文
共 50 条
  • [41] An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent
    Dharmalingam, Jeya Mala
    Eswaran, M.
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2018, 14 (03) : 56 - 82
  • [42] A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber-Physical Attacks
    Ntafloukas, Konstantinos
    Pasquale, Liliana
    Martinez-Pastor, Beatriz
    McCrum, Daniel P.
    FUTURE INTERNET, 2023, 15 (03):
  • [43] Heartbleed Attacks Implementation and Vulnerability
    Kyatam, Shashank
    Alhayajneh, Abdullah
    Hayajneh, Thaier
    2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [44] A networked approach to dynamic analysis of social system vulnerability
    Zeng, Yu
    Xiao, Renbin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (01) : 189 - 197
  • [45] Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs
    Guirguis, Mina
    Bestavros, Azer
    Matta, Ibrahim
    Zhang, Yuting
    INFOCOM 2007, VOLS 1-5, 2007, : 857 - +
  • [46] Validation of a mathematical approach to estimate dynamic scapular orientation
    Nicholson, Kristen F.
    Richardson, R. Tyler
    Rapp, Elizabeth A.
    Quinton, R. Garry
    Anzilotti, Kert F.
    Richards, James G.
    JOURNAL OF BIOMECHANICS, 2017, 54 : 101 - 105
  • [47] An empirical CDF approach to estimate the significance of gene ranking for finding differentially expressed genes
    Shaik, J.
    George, E. O.
    Yeasin, M.
    PROCEEDINGS OF THE 7TH IEEE INTERNATIONAL SYMPOSIUM ON BIOINFORMATICS AND BIOENGINEERING, VOLS I AND II, 2007, : 1071 - +
  • [48] A multi-target approach to estimate software vulnerability characteristics and severity scores
    Spanos, Georgios
    Angelis, Lefteris
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 146 : 152 - 166
  • [49] A Novel Approach for Discriminating Faults and Replay Attacks in Hybrid Systems
    Badr, Mustafa
    Talebi, Heidar Ali
    Khosravi, Mohammad A.
    IEEE ACCESS, 2024, 12 : 40064 - 40074
  • [50] A hybrid approach to prevent composition attacks for independent data releases
    Li, Jiuyong
    Baig, Muzammil M.
    Sattar, A. H. M. Sarowar
    Ding, Xiaofeng
    Liu, Jixue
    Vincent, Millist W.
    INFORMATION SCIENCES, 2016, 367 : 324 - 336