Improving VRSS-based vulnerability prioritization using analytic hierarchy process

被引:45
作者
Liu, Qixu [1 ,2 ]
Zhang, Yuqing [1 ,2 ]
Kong, Ying [1 ,2 ]
Wu, Qianru [1 ,2 ]
机构
[1] GUCAS, Natl Comp Network Intrus Protect Ctr, Beijing 100049, Peoples R China
[2] GUCAS, Sch Informat Sci & Engn, Beijing 100190, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Vulnerability evaluation; Vulnerability prioritization; Vulnerability type; Analytic hierarchy process; COMMON VULNERABILITY;
D O I
10.1016/j.jss.2012.03.057
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The number of vulnerabilities discovered in computer systems has increased explosively. Thus, a key question for system administrators is which vulnerabilities to prioritize. The need for vulnerability prioritization in organizations is widely recognized. The significant role of the vulnerability evaluation system is to separate vulnerabilities from each other as far as possible. There are two major methods to assess the severity of vulnerabilities: qualitative and quantitative methods. In this paper, we first describe the design space of vulnerability evaluation methodology and discuss the measures of well-defined evaluation framework. We analyze 11,395 CVE vulnerabilities to expose the differences among three current vulnerability evaluation systems (X-Force, CVSS and VRSS). We find that vulnerabilities are not separated from each other as much as possible. In order to increase the diversity of the results, we firstly enable vulnerability type to prioritize vulnerabilities using analytic hierarchy process on the basis of VRSS. We quantitatively characterize the vulnerability type and apply the method on the set of 11,395 CVE vulnerabilities. The results show that the quality of the quantitative scores can be improved with the help of vulnerability type. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:1699 / 1708
页数:10
相关论文
共 38 条
[1]  
Aharoni M, 2008, CVE20081611
[2]   Consistency in the analytic hierarchy process: A new approach [J].
Alonso, Jose Antonio ;
Lamata, M. Teresa .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2006, 14 (04) :445-459
[3]  
[Anonymous], 2008, P 4 ACM WORKSHOP QUA, DOI DOI 10.1145/1456362.1456368
[4]  
[Anonymous], 2005, ENCY BIOSTATISTICS
[5]  
Bob Martin S.C., 2010, COMMON WEAKNESS SCOR
[6]  
CVSS-SIG, 2007, CVSS SIG VERS 2 HIST
[7]  
Frühwirth C, 2009, INT SYMP EMP SOFTWAR, P536
[8]  
Gamier T., 2009, CVE20091126
[9]  
Google, 2007, SEV GUID SEC ISS
[10]   Quantifying security risk level from CVSS estimates of frequency and impact [J].
Houmb, Siv Hilde ;
Franqueira, Virginia N. L. ;
Engum, Erlend A. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (09) :1622-1634