{"title":"分层脆弱性评估方法的优化","authors":"L. Rui, Yan Dan-feng, Lin Fan, Y. Fangchun","doi":"10.1109/ICBNMT.2009.5348535","DOIUrl":null,"url":null,"abstract":"Network vulnerability assessment has carried out a certain degree of research work in relative field. The common method for vulnerability assessment is hierarchical asset vulnerability assessment, in which vulnerability value is fixed and the weight of service is subjective. Thus the accuracy of calculation depends on experience and judgment. In this paper, according to CVSS (Common Vulnerability Assessment System) theory, a method that takes environment factors into consideration is proposed for asset vulnerability assessment using information collected by vulnerability scanning tool. As an optimization of original method, this method is more accurate than original method.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Optimization of hierarchical vulnerability assessment method\",\"authors\":\"L. Rui, Yan Dan-feng, Lin Fan, Y. Fangchun\",\"doi\":\"10.1109/ICBNMT.2009.5348535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network vulnerability assessment has carried out a certain degree of research work in relative field. The common method for vulnerability assessment is hierarchical asset vulnerability assessment, in which vulnerability value is fixed and the weight of service is subjective. Thus the accuracy of calculation depends on experience and judgment. In this paper, according to CVSS (Common Vulnerability Assessment System) theory, a method that takes environment factors into consideration is proposed for asset vulnerability assessment using information collected by vulnerability scanning tool. As an optimization of original method, this method is more accurate than original method.\",\"PeriodicalId\":267128,\"journal\":{\"name\":\"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICBNMT.2009.5348535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBNMT.2009.5348535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Optimization of hierarchical vulnerability assessment method
Network vulnerability assessment has carried out a certain degree of research work in relative field. The common method for vulnerability assessment is hierarchical asset vulnerability assessment, in which vulnerability value is fixed and the weight of service is subjective. Thus the accuracy of calculation depends on experience and judgment. In this paper, according to CVSS (Common Vulnerability Assessment System) theory, a method that takes environment factors into consideration is proposed for asset vulnerability assessment using information collected by vulnerability scanning tool. As an optimization of original method, this method is more accurate than original method.