Publication | Closed Access
Ranking Attacks Based on Vulnerability Analysis
29
Citations
4
References
2010
Year
Unknown Venue
EngineeringInformation SecuritySecurity AssessmentSoftware EngineeringSecurity MetricsSecurity EvaluationSoftware AnalysisVulnerability AnalysisAttack PatternsVulnerability Assessment (Computing)Computer ScienceAttack GraphSoftware DesignSecurity Testing MethodData SecuritySoftware SecurityProgram AnalysisSoftware TestingSecurity MeasurementVulnerability Management Ontology
Now that multiple-known attacks can affect one software product at the same time, it is necessary to rank and prioritize those attacks in order to establish a better defense. The purpose of this paper is to provide a set of security metrics to rank attacks based on vulnerability analysis. The vulnerability information is retrieved from a vulnerability management ontology, which integrates commonly used standards like CVE, CWE, CVSS, and CAPEC. Among the benefits of ranking attacks through the method proposed here are: a more effective mitigation or prevention of attack patterns against systems, a better foundation to test software products, and a better understanding of vulnerabilities and attacks.
| Year | Citations | |
|---|---|---|
Page 1
Page 1