A vulnerability prioritization system using a fuzzy risk analysis approach

23Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this work, we present a fuzzy systems approach for assessing the relative potential risk associated with computer network assets exposed to attack by vulnerabilities. We use this approach to rank vulnerabilities so that analysts can prioritize their work based on the potential risk exposure of assets and networks. We associate vulnerabilities with individual assets, and therefore networks, and develop fuzzy models of the vulnerability attributes. Fuzzy rules are then used to make an inference on the risk exposure and the likelihood of attack, which allows us to rank the vulnerabilities and show which ones need more immediate attention. We argue that our approach has more meaningful vulnerability prioritization values than the severity level calculated by the popular Common Vulnerability Scoring System (CVSS) approach. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Dondo, M. G. (2008). A vulnerability prioritization system using a fuzzy risk analysis approach. In IFIP International Federation for Information Processing (Vol. 278, pp. 525–539). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free