Published: June 30, 2008
Author(s)
Karen Scarfone, Tim Grance
Conference
Name: 1st International Conference on Information Technology, 2008 (IT 2008)
Dates: May 18-21, 2008
Location: Gdansk, Poland
Citation: Proceedings of the 2008 1st International Conference on Information Technology, pp. 1-4
Announcement
This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually constructed models, and most approaches have examined software flaws only, not other vulnerabilities such as software misconfiguration and user misbehavior. The framework uses a metrics-based approach that can be mostly automated, producing rapid and consistent measurements for quantitative risk assessment and for attack and vulnerability modeling. In this paper, we propose the framework and its components and describe the work planned to implement them.
This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually constructed models, and most approaches have...
See full abstract
This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually constructed models, and most approaches have examined software flaws only, not other vulnerabilities such as software misconfiguration and user misbehavior. The framework uses a metrics-based approach that can be mostly automated, producing rapid and consistent measurements for quantitative risk assessment and for attack and vulnerability modeling. In this paper, we propose the framework and its components and describe the work planned to implement them.
Hide full abstract
Keywords
attack measurement; host security; quantitative risk assessment; security metrics; threat modeling; vulnerability measurement; vulnerability scoring
Control Families
None selected