首页> 外文会议>System Sciences (HICSS-43), 2010 >Ranking Attacks Based on Vulnerability Analysis
【24h】

Ranking Attacks Based on Vulnerability Analysis

机译:基于漏洞分析的排名攻击

获取原文

摘要

Now that multiple-known attacks can affect one software product at the same time, it is necessary to rank and prioritize those attacks in order to establish a better defense. The purpose of this paper is to provide a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology, which integrates commonly used standards like CVE, CWE, CVSS, and CAPEC. Among the benefits of ranking attacks through the method proposed here are: a more effective mitigation or prevention of attack patterns against systems, a better foundation to test software products, and a better understanding of vulnerabilities and attacks.
机译:现在,多种已知的攻击可以同时影响一个软件产品,因此有必要对这些攻击进行排名和优先排序,以便建立更好的防御。本文的目的是提供一组安全度量,以基于漏洞分析对攻击进行排名。漏洞信息是从漏洞管理本体中检索的,该本体集成了常用的标准,例如CVE,CWE,CVSS和CAPEC。通过此处提出的方法对攻击进行排名的好处包括:更有效地缓解或预防针对系统的攻击模式,更好的测试软件产品基础以及对漏洞和攻击的更好理解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号