{"title":"模糊逻辑在电信网络脆弱性评估中的应用","authors":"I. Anikin","doi":"10.1109/ICIEAM.2017.8076444","DOIUrl":null,"url":null,"abstract":"Modern telecommunication networks include different software kinds and operation systems with a large number of vulnerabilities. It is very important to assess risk levels for them. We suggested a method for vulnerability risk assessment in telecommunication networks. It is based on the Common Vulnerability Scoring System (CVSS) V3, expert judgments and fuzzy logic. We used fuzzy production rules to describe expert's knowledge about risks. We suggested a fuzzy inference method for these fuzzy rules. The risk assessment method has some advantages over CVSS V3. It is able to work under uncertainty and providing there are gaps in the source information.","PeriodicalId":428982,"journal":{"name":"2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Using fuzzy logic for vulnerability assessment in telecommunication network\",\"authors\":\"I. Anikin\",\"doi\":\"10.1109/ICIEAM.2017.8076444\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern telecommunication networks include different software kinds and operation systems with a large number of vulnerabilities. It is very important to assess risk levels for them. We suggested a method for vulnerability risk assessment in telecommunication networks. It is based on the Common Vulnerability Scoring System (CVSS) V3, expert judgments and fuzzy logic. We used fuzzy production rules to describe expert's knowledge about risks. We suggested a fuzzy inference method for these fuzzy rules. The risk assessment method has some advantages over CVSS V3. It is able to work under uncertainty and providing there are gaps in the source information.\",\"PeriodicalId\":428982,\"journal\":{\"name\":\"2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEAM.2017.8076444\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEAM.2017.8076444","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using fuzzy logic for vulnerability assessment in telecommunication network
Modern telecommunication networks include different software kinds and operation systems with a large number of vulnerabilities. It is very important to assess risk levels for them. We suggested a method for vulnerability risk assessment in telecommunication networks. It is based on the Common Vulnerability Scoring System (CVSS) V3, expert judgments and fuzzy logic. We used fuzzy production rules to describe expert's knowledge about risks. We suggested a fuzzy inference method for these fuzzy rules. The risk assessment method has some advantages over CVSS V3. It is able to work under uncertainty and providing there are gaps in the source information.