首页> 外文会议>Hawaii International Conference on System Sciences >Ranking Attacks Based on Vulnerability Analysis
【24h】

Ranking Attacks Based on Vulnerability Analysis

机译:基于漏洞分析的排名攻击

获取原文

摘要

Now that multiple-known attacks can affect one software product at the same time, it is necessary to rank and prioritize those attacks in order to establish a better defense. The purpose of this paper is to provide a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology, which integrates commonly used standards like CVE, CWE, CVSS, and CAPEC. Among the benefits of ranking attacks through the method proposed here are: a more effective mitigation or prevention of attack patterns against systems, a better foundation to test software products, and a better understanding of vulnerabilities and attacks.
机译:现在,多名已知的攻击可以同时影响一个软件产品,有必要对这些攻击进行排名并优先考虑,以便建立更好的防御。本文的目的是提供一组安全指标,以基于漏洞分析等级攻击。从漏洞管理本体检索漏洞信息,该漏洞集成了CVE,CWE,CVS和CAPEC等常用标准。通过此处提出的方法进行排序攻击的益处:更有效地缓解或预防攻击模式,以及测试软件产品的更好的基础,以及更好地了解漏洞和攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号