Vulnerability Analysis for a Quantitative Security Evaluation

被引:0
|
作者
Vache, Geraldine [1 ]
机构
[1] Univ Toulouse, CNRS, LAAS, F-31077 Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents the quantitative characterization of vulnerability life cycle and of exploit creation by probability distributions. This work aims at helping the production of quantitative measures of information system security considering system environment. In this paper, we focus on two environmental factors: 1) the vulnerability life cycle and 2) the attacker behaviour. We look for the probability distributions and their parameters that could model quantatively these environmental factor events. Thus, to obtain precise measures, it is needed to characterize these events using real data. For that purpose, we first selected an appropriate vulnerability database by comparing the existing and available ones. We choose the Open Source Vulnerability DataBase. After having brought back the data we need, we evaluate quantitatively the model parameters related to the vulnerability life cycle and the attacker behaviour. In doing so, we look for specificities of vulnerability categories to define the parameterization of our quantitative security evaluation modelling more precisely.
引用
收藏
页码:527 / 535
页数:9
相关论文
共 50 条
  • [1] Multics security evaluation: Vulnerability analysis
    Karger, PA
    Schell, RR
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 127 - 146
  • [2] Evaluation of Security Lifecycle for the Quantitative Analysis
    Jip, Kim Young
    Lee, Eun-Ser
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 727 - 731
  • [3] A model for quantitative security measurement and prioritisation of vulnerability mitigation
    Tripathi, A. (anshu_tripathi@yahoo.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08):
  • [4] Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis
    Bansal, Urvashi
    Sikka, Geeta
    Awasthi, Lalit K.
    Bhargava, Bharat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 298 - 308
  • [5] Hierarchical Quantitative Evaluation of Vulnerability Exploitability
    Sheng Yi
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 115 - 118
  • [6] A Method for Vulnerability Database Quantitative Evaluation
    Tan, Tiantian
    Wang, Baosheng
    Tang, Yong
    Zhou, Xu
    Han, Jingwen
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (03): : 1129 - 1144
  • [7] Analysis of Chinese Energy Security Based on Quantitative Evaluation Method
    Zhang, Yan
    Shen, Lei
    Shi, Minjun
    APPLIED ENERGY TECHNOLOGY, PTS 1 AND 2, 2013, 724-725 : 1206 - 1210
  • [8] Network Security Architecture Based on Vulnerability Evaluation
    Li, June
    Wang, Tongqing
    Zhou, Dongru
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
  • [9] Evaluation of Security Vulnerability Severity Based on CMAHP
    Song, Jialiang
    Han, Jihong
    Zhang, Danlin
    Yuan, Lin
    Shao, Lulu
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1056 - 1060
  • [10] Formal Vulnerability Analysis of Security Components
    Feiten, Linus
    Sauer, Matthias
    Schubert, Tobias
    Tomashevich, Victor
    Polian, Ilia
    Becker, Bernd
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1358 - 1369