期刊文献+

一种自动优化CVSSv2.0漏洞指标的评估方法 被引量:4

Assessment method of automatic optimizing CVSS v2.0 vulnerability indicators
下载PDF
导出
摘要 针对CVSS v2.0主观性强、操作性差,建立自动化评估模型困难的问题,提出在CVSS v2.0评估体系的基础上,改进其评价指标体系,把评价指标分为主客观两类;使用BP神经网络自学习原理再次优化评价因子;并建立基于BP神经网络的自动化评估模型,快速地对输入指标的特征做逼近实效的量化。通过MATLAB仿真验证了该方法的有效性、准确性与可行性。 Considering that there are several drawbacks included in CVSS 2.0, such as strongly subjectivity, inefficient maneuverability, the difficulty to create automated assessment model, the evaluation index system is improved based on CVSS 2.0 evaluation system. And the evaluation index system is divided into two parts which are objective category and subjective category. It optimizes evaluation factor with principles of BP neural network self-learning and builds an automation evaluation model based on BP neural network, then quantizes the input indicators characteristic into approximation of effectiveness rapidly. Finally the effectiveness, accuracy and feasibility of the method are proved by MATLAB simulation.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第2期103-107,124,共6页 Computer Engineering and Applications
关键词 通用漏洞评估系统(CVSS) 指标量化 反向传播(BP)神经网络 评估模型 MATLAB Common Vulnerability Scoring System(CVSS) indicator quantified Back Propagation(BP)neural network evaluation model MATLAB
  • 相关文献

参考文献15

  • 1Reid G,Mell P,Scarfone K.CVSS-SIG version 2 history[EB/OL].(2007-06-10).http://www.first.org/cvss/history.html#c6.
  • 2Mell P,Scarfone K,Romanosky S.A complete guide to the common vulnerability scoring system version 2.0[EB/OL].(2007-06-13).http://www.first.org/cvss/cvss-guide.html#i2.1.2.
  • 3Common vulnerability scoring system[EB/OL].(2004-10-12).http://www.First.org/cvss/cvss-dhs-12-02-04pdf.
  • 4蒋杨永,蒋建华.基于BP神经网络的虚拟企业风险评价研究[J].计算机仿真,2009,26(12):261-264. 被引量:6
  • 5Zbib R,Ghosh A,Anjum F,et al.Intrusion tolerance in distributed middleware[J].Information Systems Frontiers Journal,2004,6(1):67-75.
  • 6US-CERT vulnerability notes field descriptions[EB/OL].[2012-10-11].http://www.kb.cert.org/vuls/html/fieldhelp#metric.
  • 7SANS critical vulnerability analysis[EB/OL].[2012-10-11].http://www.sans.org/newsletters/cva/.
  • 8About secunia advisories[EB/OL].[2012-10-11].http://secunia.com/about_secunia_advisories/.
  • 9Verissimo P E,Neves N F,Correia M P.Intrusion tolerant architecture:concepts and design[EB/OL].(2003-07-18).http://www.difc.ul.pt/techreports/03-5.pdf.
  • 10中国国家安全漏洞数据库[EB/OL].[2012-11-03].http://www.cnnvd.org.cn/.

二级参考文献31

共引文献67

同被引文献36

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部