Vulnerability Analysis for a Quantitative Security Evaluation

被引:0
|
作者
Vache, Geraldine [1 ]
机构
[1] Univ Toulouse, CNRS, LAAS, F-31077 Toulouse, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents the quantitative characterization of vulnerability life cycle and of exploit creation by probability distributions. This work aims at helping the production of quantitative measures of information system security considering system environment. In this paper, we focus on two environmental factors: 1) the vulnerability life cycle and 2) the attacker behaviour. We look for the probability distributions and their parameters that could model quantatively these environmental factor events. Thus, to obtain precise measures, it is needed to characterize these events using real data. For that purpose, we first selected an appropriate vulnerability database by comparing the existing and available ones. We choose the Open Source Vulnerability DataBase. After having brought back the data we need, we evaluate quantitatively the model parameters related to the vulnerability life cycle and the attacker behaviour. In doing so, we look for specificities of vulnerability categories to define the parameterization of our quantitative security evaluation modelling more precisely.
引用
收藏
页码:527 / 535
页数:9
相关论文
共 50 条
  • [41] Vulnerability Analysis of the Grid Data Security Authentication System
    Yang, Seung S.
    Choi, Hongsik
    Joo, Hankyu
    INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 182 - 190
  • [42] The role of program analysis in security vulnerability detection: Then and now
    Cifuentes, Cristina
    Gauthier, Francois
    Hassanshahi, Behnaz
    Krishnan, Padmanabhan
    Mccall, Davin
    COMPUTERS & SECURITY, 2023, 135
  • [43] Power Analysis Attack: A Vulnerability to Smart Card Security
    Mahanta, Hridoy Jyoti
    Azad, Abul Kalam
    Khan, Ajoy Kumar
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 506 - 510
  • [44] Security usability principles for vulnerability analysis and risk assessment
    Josang, Audun
    AlFayyadh, Bander
    Grandison, Tyrone
    AlZomai, Mohammed
    McNamara, Judith
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 269 - +
  • [45] Security vulnerability analysis for laboratories and small chemical facilities
    Phifer, Russell W.
    JOURNAL OF CHEMICAL HEALTH & SAFETY, 2007, 14 (06): : 12 - 14
  • [46] Static Security Analysis based on Weighted Vulnerability Index
    Pang, Chengzong
    Kezunovic, Mladen
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [47] Vulnerability Analysis for Simultaneous Attack in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2017 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2017,
  • [48] Analysis of security vulnerability diagnosis in mobile IP networks
    Lee, Dong Chun
    Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, Proceedings, 2006, 4331 : 949 - 954
  • [49] Static analysis of vulnerability and security margin of the power system
    Song, Hongbiao
    Kezunovic, Mladen
    2005/2006 IEEE/PES TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION, VOLS 1-3, 2006, : 147 - +
  • [50] Towards a Quantitative Analysis of Security Protocols
    Adao, Pedro
    Mateus, Paulo
    Reis, Tiago
    Vigano, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 164 (03) : 3 - 25