Back to Search Start Over

The algorithm model for cumulative vulnerability risk assessment

Authors :
Chen, Yong Yan
Shu, Hong Chun
Source :
International Journal of Internet Protocol Technology; January 2014, Vol. 8 Issue: 2-3 p150-157, 8p
Publication Year :
2014

Abstract

The network information security vulnerability assessment consists of two kinds of risks. The stable risks of vulnerability itself and the cumulative multi-risks that are generated from a successful attack and which can impact on the whole network. To count cumulative multi-risk, a new method has been developed, which uses vulnerabilities in attack graph and reverse iteration tracing algorithm based on rough sets. Two kinds of cumulative multi-risks will be identified, named ‘the worst state’ and ‘the critical state’. The experimental evidences prove the veracity and validity of the new algorithm model.

Details

Language :
English
ISSN :
17438209 and 17438217
Volume :
8
Issue :
2-3
Database :
Supplemental Index
Journal :
International Journal of Internet Protocol Technology
Publication Type :
Periodical
Accession number :
ejs34465781
Full Text :
https://doi.org/10.1504/IJIPT.2014.066362