首页> 外文学位 >Quantitative risk assessment under multi-context environments.
【24h】

Quantitative risk assessment under multi-context environments.

机译:在多上下文环境下进行定量风险评估。

获取原文
获取原文并翻译 | 示例

摘要

If you cannot measure it, you cannot improve it. Quantifying security with metrics is important not only because we want to have a scoring system to track our efforts in hardening cyber environments, but also because current labor resources cannot administrate the exponentially enlarged network without a feasible risk prioritization methodology. Unlike height, weight or temperature, risk from vulnerabilities is sophisticated to assess and the assessment is heavily context-dependent.;Existing vulnerability assessment methodologies (e.g. CVSS scoring system, etc) mainly focus on the evaluation over intrinsic risk of individual vulnerabilities without taking their contexts into consideration. Vulnerability assessment over network usually output one aggregated metric indicating the security level of each host. However, none of these work captures the severity change of each individual vulnerabilities under different contexts.;I have captured a number of such contexts for vulnerability assessment. For example, the correlation of vulnerabilities belonging to the same application should be considered while aggregating their risk scores. At system level, a vulnerability detected on a highly depended library code should be assigned with a higher risk metric than a vulnerability on a rarely used client side application, even when the two have the same intrinsic risk. Similarly at cloud environment, vulnerabilities with higher prevalences deserve more attention. Besides, zero-day vulnerabilities are largely utilized by attackers therefore should not be ignored while assessing the risks. Historical vulnerability information at application level can be used to predict underground risks. To assess vulnerability with a higher accuracy, feasibility, scalability and efficiency, I developed a systematic vulnerability assessment approach under each of these contexts.
机译:如果无法衡量,就无法改进。用指标量化安全性很重要,这不仅是因为我们希望拥有一个评分系统来跟踪我们在强化网络环境中的工作,而且还因为当前的劳动力资源无法在没有可行的风险优先方法的情况下管理指数级增长的网络。与高度,重量或温度不同,漏洞的风险评估起来很复杂,并且评估严重依赖于上下文。现有漏洞评估方法(例如CVSS评分系统等)主要侧重于评估各个漏洞的内在风险,而无需考虑其风险。考虑到上下文。通过网络进行的漏洞评估通常会输出一个汇总指标,指示每个主机的安全级别。但是,这些工作都没有捕捉到在不同情况下每个漏洞的严重性变化。我已经捕获了许多此类情况用于脆弱性评估。例如,在汇总风险分数时,应考虑属于同一应用程序的漏洞的相关性。在系统级别,应该为在高度依赖的库代码上检测到的漏洞分配比在很少使用的客户端应用程序上更高的风险度量标准,即使两者具有相同的固有风险。同样,在云环境中,具有较高普遍性的漏洞值得更多关注。此外,攻击者主要利用零日漏洞,因此在评估风险时不应忽略。应用程序级别的历史漏洞信息可用于预测地下风险。为了以更高的准确性,可行性,可扩展性和效率评估漏洞,我在每种情况下都开发了系统的漏洞评估方法。

著录项

  • 作者

    Zhang, Su.;

  • 作者单位

    Kansas State University.;

  • 授予单位 Kansas State University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 127 p.
  • 总页数 127
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号