Skip to main content

2015 | OriginalPaper | Buchkapitel

Software Vulnerability Severity Evaluation Based on Economic Losses

verfasst von : Yunxue Yang, Shuyuan Jin, Xiaowei He

Erschienen in: Trustworthy Computing and Services

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Enterprises suffer economic losses due to vulnerability exploitation. The aim of this paper is to propose a comprehensive software vulnerability severity evaluation model incorporating technical assessment and circumstances information of enterprises, especially economic losses caused by vulnerability exploitation. We use analytic hierarchy process to establish the model and get weights of evaluation factors, obtaining both of qualitative severity ranking levels and quantitative severity scores of vulnerabilities. Through case study, we show that evaluation values are accurate and effective and consequently, our model can be used for security improvement prioritization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Frigault, M., Wang, L.Y., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: ACM Conference on Computer and Communications Security, pp. 23 − 30 (2008) Frigault, M., Wang, L.Y., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: ACM Conference on Computer and Communications Security, pp. 23 − 30 (2008)
5.
Zurück zum Zitat Cheng, P.S., Wang, L.Y., Jajodia, S., Singhal, A.: Aggregating CVSS base scores for semantics-rich network security metrics. In: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, USA, 8 − 11 October 2012 Cheng, P.S., Wang, L.Y., Jajodia, S., Singhal, A.: Aggregating CVSS base scores for semantics-rich network security metrics. In: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, USA, 8 − 11 October 2012
6.
Zurück zum Zitat Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1–20 (2014)CrossRef Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1–20 (2014)CrossRef
7.
Zurück zum Zitat Huang, C.C., Lin, F.Y., Lin, F.Y.-S., Sun, Y.S.: A novel approach to evaluate software vulnerability prioritization. J. Syst. Softw. 86, 2822–2840 (2013)CrossRef Huang, C.C., Lin, F.Y., Lin, F.Y.-S., Sun, Y.S.: A novel approach to evaluate software vulnerability prioritization. J. Syst. Softw. 86, 2822–2840 (2013)CrossRef
8.
Zurück zum Zitat Liu, Q.X., Zhang, Y.Q.: VRSS: a new system for rating and scoring vulnerabilities. Comput. Commun. 34(3), 264–273 (2011)CrossRef Liu, Q.X., Zhang, Y.Q.: VRSS: a new system for rating and scoring vulnerabilities. Comput. Commun. 34(3), 264–273 (2011)CrossRef
9.
Zurück zum Zitat Liu, Q.X., Zhang, Y.Q., Kong, Y., Wu, Q.R.: Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85, 1699–1708 (2012)CrossRef Liu, Q.X., Zhang, Y.Q., Kong, Y., Wu, Q.R.: Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85, 1699–1708 (2012)CrossRef
10.
Zurück zum Zitat Ghani, H., Luna, J., Suri, N.: Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In: 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE Computer Society, p. 8 (2013) Ghani, H., Luna, J., Suri, N.: Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In: 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE Computer Society, p. 8 (2013)
11.
Zurück zum Zitat Innerhofer-Oberperfler, F., Breu, R.: An empirically derived loss taxonomy based on publicly known security incidents. In: 4th International Conference on Availability, Reliability and Security (ARES), vol. 1 and 2, pp. 66–73 (2009) Innerhofer-Oberperfler, F., Breu, R.: An empirically derived loss taxonomy based on publicly known security incidents. In: 4th International Conference on Availability, Reliability and Security (ARES), vol. 1 and 2, pp. 66–73 (2009)
12.
Zurück zum Zitat Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48, 9–26 (1990)MATHCrossRef Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48, 9–26 (1990)MATHCrossRef
Metadaten
Titel
Software Vulnerability Severity Evaluation Based on Economic Losses
verfasst von
Yunxue Yang
Shuyuan Jin
Xiaowei He
Copyright-Jahr
2015
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-47401-3_19