Vulnerability Analysis for a Quantitative Security Evaluation

被引:0
|
作者
Vache, Geraldine [1 ]
机构
[1] Univ Toulouse, CNRS, LAAS, F-31077 Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents the quantitative characterization of vulnerability life cycle and of exploit creation by probability distributions. This work aims at helping the production of quantitative measures of information system security considering system environment. In this paper, we focus on two environmental factors: 1) the vulnerability life cycle and 2) the attacker behaviour. We look for the probability distributions and their parameters that could model quantatively these environmental factor events. Thus, to obtain precise measures, it is needed to characterize these events using real data. For that purpose, we first selected an appropriate vulnerability database by comparing the existing and available ones. We choose the Open Source Vulnerability DataBase. After having brought back the data we need, we evaluate quantitatively the model parameters related to the vulnerability life cycle and the attacker behaviour. In doing so, we look for specificities of vulnerability categories to define the parameterization of our quantitative security evaluation modelling more precisely.
引用
收藏
页码:527 / 535
页数:9
相关论文
共 50 条
  • [11] A Security Vulnerability Analysis of SoCFPGA Architectures
    Chaudhuri, Sumanta
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [12] Analysis and Research on Security Vulnerability Database
    Fang, Jing
    Li, Yifu
    Li, Yingbo
    PROCEEDINGS OF THE 2ND INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2016), 2016, 24 : 145 - 151
  • [13] Vulnerability Analysis and Security Modeling of MODBUS
    Kwon, Taeyean
    Lee, Jaehoon
    Yi, Okyeon
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2246 - 2251
  • [14] Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems
    Ye, Xiaming
    Zhao, Junhua
    Zhang, Yan
    Wen, Fushuan
    ENERGIES, 2015, 8 (06): : 5266 - 5286
  • [15] Quantitative Evaluation Method of Cloud Security
    Zhao, Xinlong
    Zhang, Weishi
    Ma, Wei
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 215 - 225
  • [16] An implementation of vulnerability evaluation system for network security on CC
    Kim, JG
    Lee, YC
    Lee, JK
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 1091 - 1095
  • [17] Elaborating quantitative approaches for it security evaluation
    Gritzalis, D
    Karyda, M
    Gymnopoulos, L
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 67 - 77
  • [18] New Vulnerability Scoring System for Dynamic Security Evaluation
    Keramati, Marjan
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 746 - 751
  • [19] A quantitative evaluation model for network security
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    Wang, Wei
    Zhang, Lejun
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 773 - 777
  • [20] Smart Contract Vulnerability Analysis and Security Audit
    He, Daojing
    Deng, Zhi
    Zhang, Yuxing
    Chan, Sammy
    Cheng, Yao
    Guizani, Nadra
    IEEE NETWORK, 2020, 34 (05): : 276 - 282