Vulnerability Analysis for a Quantitative Security Evaluation

被引:0
|
作者
Vache, Geraldine [1 ]
机构
[1] Univ Toulouse, CNRS, LAAS, F-31077 Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents the quantitative characterization of vulnerability life cycle and of exploit creation by probability distributions. This work aims at helping the production of quantitative measures of information system security considering system environment. In this paper, we focus on two environmental factors: 1) the vulnerability life cycle and 2) the attacker behaviour. We look for the probability distributions and their parameters that could model quantatively these environmental factor events. Thus, to obtain precise measures, it is needed to characterize these events using real data. For that purpose, we first selected an appropriate vulnerability database by comparing the existing and available ones. We choose the Open Source Vulnerability DataBase. After having brought back the data we need, we evaluate quantitatively the model parameters related to the vulnerability life cycle and the attacker behaviour. In doing so, we look for specificities of vulnerability categories to define the parameterization of our quantitative security evaluation modelling more precisely.
引用
收藏
页码:527 / 535
页数:9
相关论文
共 50 条
  • [21] Vulnus: Visual Vulnerability Analysis for Network Security
    Angelini, Marco
    Blasilli, Graziano
    Catarci, Tiziana
    Lenti, Simone
    Santucci, Giuseppe
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2019, 25 (01) : 183 - 192
  • [22] Anomaly Behavior Analysis of Website Vulnerability and Security
    Satam, Pratik
    Kelly, Douglas
    Hariri, Salim
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [23] AADL Vulnerability Modeling and Security Analysis Method
    Cao, Yang
    Dong, Yunwei
    Wei, Xiaomin
    Wu, Xiao
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 399 - 406
  • [24] Analysis of Security Vulnerability in Cooperative Communication Networks
    Kim, Ki Hong
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 80 - 84
  • [25] Review and outlook of information security vulnerability analysis
    Wu, Shizhong
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2065 - 2072
  • [26] A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard
    Wen, Shao-Fang
    Katt, Basel
    COMPUTERS & SECURITY, 2023, 135
  • [27] A Comparative Analysis of 65nm CMOS SRAM and Commercial SRAMs in Security Vulnerability Evaluation
    Ho, Weng-Geng
    Zheng, Zixian
    Chong, Kwen-Siong
    Gwee, Bah-Hwee
    2018 IEEE 23RD INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2018,
  • [28] Quantitative evaluation of national energy security by using multi-objective analysis
    Department of Management Science and Technology, Tohoku University, 6-6-11-816 Aramakiazaaoba, Aoba-ku, Sendai-shi, Miyagi
    980-8579, Japan
    Int, Conf. Power Eng.,
  • [29] Quantitative evaluation of vulnerability exploitability in network information systems
    School of Computer Science, Civil Aviation University of China, Tianjin 300300, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2157-2163): : 2157 - 2163
  • [30] The Description of Population Vulnerability in Quantitative Risk Analysis
    Bonvicini, Sarah
    Ganapini, Sara
    Spadoni, Gigliola
    Cozzani, Valerio
    RISK ANALYSIS, 2012, 32 (09) : 1576 - 1594