Title :
Ranking Attacks Based on Vulnerability Analysis
Author :
Wang, Ju An ; Wang, Hao ; Guo, Minzhe ; Zhou, Linfeng ; Camargo, Jairo
Abstract :
Now that multiple-known attacks can affect one software product at the same time, it is necessary to rank and prioritize those attacks in order to establish a better defense. The purpose of this paper is to provide a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology, which integrates commonly used standards like CVE, CWE, CVSS, and CAPEC. Among the benefits of ranking attacks through the method proposed here are: a more effective mitigation or prevention of attack patterns against systems, a better foundation to test software products, and a better understanding of vulnerabilities and attacks.
Keywords :
ontologies (artificial intelligence); program testing; security of data; ranking attacks; software product; vulnerability analysis; vulnerability management ontology; Computer industry; Data security; Information retrieval; Information security; Ontologies; Programming; Software standards; Software systems; Software testing; Software tools;
Conference_Titel :
System Sciences (HICSS), 2010 43rd Hawaii International Conference on
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4244-5509-6
Electronic_ISBN :
1530-1605
DOI :
10.1109/HICSS.2010.313