Measuring and ranking attacks based on vulnerability analysis

被引:9
作者
Wang, Ju An [1 ]
Guo, Minzhe [1 ]
Wang, Hao [1 ]
Zhou, Linfeng [1 ]
机构
[1] So Polytech State Univ, Sch Comp & Software Engn, Marietta, GA USA
基金
美国国家科学基金会;
关键词
Information and e-business security; Vulnerability analysis; Threats and attacks; Similarity; Ranking; Ontology;
D O I
10.1007/s10257-011-0173-5
中图分类号
F [经济];
学科分类号
02 ;
摘要
As the number of software vulnerabilities increases, the research on software vulnerabilities becomes a focusing point in information security. A vulnerability could be exploited to attack the information asset with the weakness related to the vulnerability. However, multiple attacks may target one software product at the same time, and it is necessary to rank and prioritize those attacks in order to establish a better defense. This paper proposes a similarity measurement to compare and categorize vulnerabilities, and a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology integrating commonly used standards like CVE (http://www.cve.mitre.org/), CWE (http://www.cwe.mitre.org/), CVSS (http://www.first.org/cvss/), and CAPEC (http://www.capec.mitre.org/). This approach can be used in many areas of vulnerability management to secure information systems and e-business, such as vulnerability classification, mitigation and patching, threat detection and attack prevention.
引用
收藏
页码:455 / 490
页数:36
相关论文
共 17 条
[1]   Code Based Software Security Vulnerability Analyzing and Detecting Based on Similar Characteristic [J].
An, Xifeng ;
Li, Weihua ;
Pan, Wei .
2008 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM AND KNOWLEDGE ENGINEERING, VOLS 1 AND 2, 2008, :584-589
[2]  
[Anonymous], 2007, 1 FORUM INCIDENT RES
[3]  
[Anonymous], 2007, SANS TOP 20 2007 SEC
[4]  
Byers D, 2006, P 22 IEEE INT C SOFT
[5]  
Common Weakness Enumeration (CWE) the MITRE Corporation, 2009, TOP 25 MOST DANG PRO
[6]   Exploiting hierarchical domain structure to compute similarity [J].
Ganesan, P ;
Garcia-Molina, H ;
Widom, J .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2003, 21 (01) :64-93
[7]  
Gegick M., 2008, P 4 ACM WORKSH QUAL
[8]  
Gegick M, 2008, P 19 INT S SOFTW REL
[9]  
Igure VM, 2008, IEEE COMMUNICATIONS, V10, P12
[10]  
Mehta V, 2006, P REC ADV INTR DET