Ranking Attacks Based on Vulnerability Analysis

  • Authors:
  • Ju An Wang;Hao Wang;Minzhe Guo;Linfeng Zhou;Jairo Camargo

  • Affiliations:
  • -;-;-;-;-

  • Venue:
  • HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Now that multiple-known attacks can affect one software product at the same time, it is necessary to rank and prioritize those attacks in order to establish a better defense. The purpose of this paper is to provide a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology, which integrates commonly used standards like CVE, CWE, CVSS, and CAPEC. Among the benefits of ranking attacks through the method proposed here are: a more effective mitigation or prevention of attack patterns against systems, a better foundation to test software products, and a better understanding of vulnerabilities and attacks.