Back to Search
Start Over
The algorithm model for cumulative vulnerability risk assessment
- Source :
- International Journal of Internet Protocol Technology; January 2014, Vol. 8 Issue: 2-3 p150-157, 8p
- Publication Year :
- 2014
-
Abstract
- The network information security vulnerability assessment consists of two kinds of risks. The stable risks of vulnerability itself and the cumulative multi-risks that are generated from a successful attack and which can impact on the whole network. To count cumulative multi-risk, a new method has been developed, which uses vulnerabilities in attack graph and reverse iteration tracing algorithm based on rough sets. Two kinds of cumulative multi-risks will be identified, named ‘the worst state’ and ‘the critical state’. The experimental evidences prove the veracity and validity of the new algorithm model.
Details
- Language :
- English
- ISSN :
- 17438209 and 17438217
- Volume :
- 8
- Issue :
- 2-3
- Database :
- Supplemental Index
- Journal :
- International Journal of Internet Protocol Technology
- Publication Type :
- Periodical
- Accession number :
- ejs34465781
- Full Text :
- https://doi.org/10.1504/IJIPT.2014.066362