Vulnerability Analysis for a Quantitative Security Evaluation

被引:0
|
作者
Vache, Geraldine [1 ]
机构
[1] Univ Toulouse, CNRS, LAAS, F-31077 Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents the quantitative characterization of vulnerability life cycle and of exploit creation by probability distributions. This work aims at helping the production of quantitative measures of information system security considering system environment. In this paper, we focus on two environmental factors: 1) the vulnerability life cycle and 2) the attacker behaviour. We look for the probability distributions and their parameters that could model quantatively these environmental factor events. Thus, to obtain precise measures, it is needed to characterize these events using real data. For that purpose, we first selected an appropriate vulnerability database by comparing the existing and available ones. We choose the Open Source Vulnerability DataBase. After having brought back the data we need, we evaluate quantitatively the model parameters related to the vulnerability life cycle and the attacker behaviour. In doing so, we look for specificities of vulnerability categories to define the parameterization of our quantitative security evaluation modelling more precisely.
引用
收藏
页码:527 / 535
页数:9
相关论文
共 50 条
  • [31] INFORMATION TECHNOLOGY SECURITY EVALUATION CRITERIA (ITSEC) - A CONTRIBUTION TO VULNERABILITY
    GEHRKE, M
    PFITZMANN, A
    RANNENBERG, K
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 579 - 587
  • [32] Software security evaluation using multilevel vulnerability discovery modeling
    Sharma, Ruchi
    Shrivastava, Avinash K.
    Hoang Pham
    QUALITY ENGINEERING, 2023, 35 (02) : 341 - 352
  • [33] Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 440 - 453
  • [34] Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports
    Beba, Sindre
    Karlsen, Magnus Melseth
    Li, Jingyue
    Zhang, Bing
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021), 2021, : 275 - 284
  • [35] Research of Information Security Quantitative Evaluation Method
    Zang Wenlong
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 369 - 372
  • [36] An improved quantitative evaluation method for network security
    Xi, Rong-Rong
    Yun, Xiao-Chun
    Zhang, Yong-Zheng
    Hao, Zhi-Yu
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (04): : 749 - 758
  • [37] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [38] A Survey on Quantitative Evaluation of Web Service Security
    Zhou, Bo
    Shi, Qi
    Yang, Po
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 715 - 721
  • [39] SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment
    Akram, Junaid
    Luo, Ping
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (02): : 294 - 318
  • [40] SV-AF - A Security Vulnerability Analysis Framework
    Alqahtani, Sultan S.
    Eghan, Ellis E.
    Rilling, Juergen
    2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 219 - 229