New Vulnerability Scoring System for Dynamic Security Evaluation

被引:0
|
作者
Keramati, Marjan [1 ]
机构
[1] Semnan Univ, Dept Comp Sci, Semnan, Iran
关键词
CVSS; Risk; Vulnerability; Impact;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Currently, because of the exponential growth of vulnerabilities, one of the most essential requirements for IT managers is to improve network security by eliminating vulnerabilities that are most hazardous. Achieving this goal requires ranking vulnerabilities based on their peril to the network. Today, this target has become possible by introducing open standards such as Common Vulnerability Scoring System (CVSS) for ranking vulnerabilities. But, CVSS suffers from basic and serious problems that limits use of it for efficient vulnerability scoring. One constraint is its limited diversity of scores that a small set of discrete values are used for ranking large amount of vulnerabilities. Another challenge is that, CVSS does not score features of the vulnerability that change over time such as availability of exploit tools. By considering these limitations, in this paper a Vulnerability Scoring System has developed that assess the risk of each known vulnerability based on its intrinsic and temporal features. Also, in this paper a novel method is proposed for the Impact estimation of vulnerability exploiting that improves the diversity of risk scores considerably.
引用
收藏
页码:746 / 751
页数:6
相关论文
共 50 条
  • [1] A vulnerability model for power system dynamic security assessment
    Li, Jianlan
    Huang, Shuhong
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2014, 62 : 59 - 65
  • [2] Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System
    Doynikova, Elena
    Chechulin, Andrey
    Kotenko, Igor
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 53 - 61
  • [3] SYSTEM VULNERABILITY AS A CONCEPT TO ASSESS POWER-SYSTEM DYNAMIC SECURITY
    FOUAD, AA
    ZHOU, Q
    VITTAL, V
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1994, 9 (02) : 1009 - 1015
  • [4] An implementation of vulnerability evaluation system for network security on CC
    Kim, JG
    Lee, YC
    Lee, JK
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 1091 - 1095
  • [5] Common vulnerability, scoring system
    Mell, Peter
    Scarfone, Karen
    Romanosky, Sasha
    IEEE SECURITY & PRIVACY, 2006, 4 (06) : 85 - 89
  • [6] Security threat probability computation using Markov Chain and Common Vulnerability Scoring System
    Le, Ngoc T.
    Hoang, Doan B.
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 306 - 311
  • [7] Vulnerability distribution scoring for software product security assessment
    Rasheed, Hassan, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06):
  • [8] Enhancing vulnerability scoring for information security in intelligent computers
    Zhu Q.
    International Journal of Intelligent Networks, 2023, 4 : 253 - 260
  • [9] Improving the Common Vulnerability Scoring System
    Mell, P.
    Scarfone, K.
    IET INFORMATION SECURITY, 2007, 1 (03) : 119 - 127
  • [10] Information Security Vulnerability Analysis System Based on Dynamic Cooperation Mechanism
    Ruo, Hu
    Tian, Chen Chao
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 142 - 149