Abstract
Networked hosts are facing more and more threats due to software vulnerabilities. Every year, there are an increasing number of security vulnerabilities discovered in software. It is impractical that we patch all the vulnerabilities because of the high cost of patching procedure. In this paper, we propose a user environments based scoring method. We analyze vulnerability impact from three aspects: confidentiality, integrity and availability. The score is customized to reflect the vulnerability’s risk under certain security request by assigning the weight on the three aspects according to the host’s function in an organization. We use attack graph to analyze the relationships among vulnerabilities in a host, and calculate on the context to get each vulnerability’s threat. The experimental results indicate that our scoring method can better reflect the real situation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
CERT/CC,CERT/CC Statistics (2004-2008), http://www.cert.org/stats/cert_stats.html/
NVD, http://nvd.nist.gov/
Open Source Vulnerability Database (OSVDB), http://osvdb.org/
Public Cooperative Vulnerability Database, https://cirdb.cerias.purdue.edu/coopvdb/public/
Security Focus Vulnerability Database, http://www.securityfocus.com/vulnerabilities
Phillips, C., Swiler, L.: A graph-based system for network-vulnerability analysis. In: Proceedings of the New Security Paradigms Workshop, NSPW 1998 (1998)
Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 156–165 (2001)
Sheyner, Haines, J., Jha, S., Lippmann, R.: Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 254–265 (2002)
Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 217–224 (2002)
SANS Institute. SANS Critical Vulnerability Analysis Archive. Undated (cited March 16, 2007)
Microsoft Corporation. Microsoft Security Response Center Security Bulletin Severity Rating System (November 2002) (cited March 16, 2007)
Sheyner, O., Wing, J.: Tools for Generating and Analyzing Attack Graphs. In: Proc. of Workshop on Formal Methods for Comp. and Objects, pp. 344–371 (2004)
Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 49–63 (2002)
Ingols, K., Lippmann, R., Piwowarski, K.: Practical Attack Graph Generation for Network Defense. In: Proc.of Comp. Sec. App. Conf., pp. 121–130 (2006)
Noel, S., Jacobs, M., Kalapa, P.: Multiple Coordinated Views for Network Attack Graphs. In: Workshop on Visualization for Computer Security, Minneapolis, MN, USA, October 26, pp. 99–106 (2005)
Dawkins, J., Hale, J.: A Systematic Approach to Multi-Stage Network Attack Analysis. In: Proceedings of the Second IEEE International Information Assurance Workshop (IWIA 2004) (2004)
Jajodia, S., Noel, S., O’Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publishers, Dordrecht (2003)
Wang, L., Noel, S., Jajodia, S.: Minimum-cost network hardening using attack graphs. Computer Communications 29(18), 3812–3824 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, C., Bao, Y., Liang, X., Zhang, T. (2013). Vulnerability Evaluating Based on Attack Graph. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_70
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)