Assessment of Windows system security using vulnerability relationship graph

被引:0
|
作者
Zhang, YZ [1 ]
Fang, BX [1 ]
Chi, Y [1 ]
Yun, XC [1 ]
机构
[1] Harbin Inst Technol, Res Ctr Comp Network & Informat Secur Technol, Harbin 150001, Heilongjiang, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To evaluate the security situation of Windows systems for different users on different security attributes, this paper proposes a quantitative assessment method based on vulnerability relationship graph (VRG) and an index-based assessment policy. Through introducing the correlative influences of vulnerabilities, VRG can be used to scientifically detect high risk vulnerabilities which can evoke multistage attacks although their threats on surface are very little. Analysis of 1085 vulnerabilities indicates that for trusted remote visitors, the security of Windows systems is lower while for distrusted remote visitors, they are relatively secure. But there is no obvious difference of the security risk on confidentiality, authenticity and availability of Windows systems. In several known versions, the security of Windows NT is almost lowest.
引用
收藏
页码:415 / 420
页数:6
相关论文
共 50 条
  • [1] Windows 10 Operating System: Vulnerability Assessment and Exploitation
    Softic, Jasmin
    Vejzovic, Zanin
    2022 21ST INTERNATIONAL SYMPOSIUM INFOTEH-JAHORINA (INFOTEH), 2022,
  • [2] Call Graph Delta Analysis and Security Vulnerability Assessment with Static Analysis
    Sozer, Hasan
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2412 - 2417
  • [3] PRA for vulnerability assessment of power system infrastructure security
    Lin, K
    Holbert, KE
    37TH NORTH AMERICAN POWER SYMPOSIUM, PROCEEDINGS, 2005, : 43 - 51
  • [4] A vulnerability model for power system dynamic security assessment
    Li, Jianlan
    Huang, Shuhong
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2014, 62 : 59 - 65
  • [5] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation
    Shin, Gun-Yoon
    Hong, Sung-Sam
    Lee, Jung-Sik
    Han, In-Sung
    Kim, Hwa-Kyung
    Oh, Haeng-Rok
    APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [6] Vulnerability Assessment of Power Grid Using Graph Topological Indices
    Kim, Charles J.
    Obah, Obinna B.
    INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS, 2007, 8 (06):
  • [7] The Effect of Weighted Moving Windows on Security Vulnerability Prediction
    Kudjo, Patrick Kwaku
    Chen, Jinfu
    Brown, Selasie Aformaley
    Mensah, Solomon
    2019 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2019), 2019, : 65 - 68
  • [8] Security simulation for vulnerability assessment
    Hennessey, Brian
    Norman, Bradley
    Wesson, Robert B.
    ENABLING TECHNOLOGIES FOR SIMULATION SCIENCE X, 2006, 6227
  • [9] Security simulation for vulnerability assessment
    Hennessey, Brian
    Wesson, Robert B.
    Norman, Bradley
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2007, 22 (09) : 11 - 16
  • [10] Security simulation for vulnerability assessment
    Hennessey, Brian
    Norman, Bradley
    Wesson, Robert B.
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 46 - +