Volume 29, Issue 4 (10-2014)                   2014, 29(4): 1107-1145 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Mohammadi S, Sherkat M H, Jami pour M. A computational method based on CVSS for quantifying the vulnerabilities in computer network . Iranian Journal of Information Processing and Management. 2014; 29 (4) :1107-1145
URL: http://jipm.irandoc.ac.ir/article-1-2608-en.html
Khajeh Nasir Toosi University
Abstract:   (4249 Views)
Network vulnerability taxonomy has become increasingly important in the area of information and data exchange not only for its potential use in identification of vulnerabilities but also in their assessment and prioritization. Computer networks play an important role in information and communication infrastructure. However, they are constantly exposed to a variety of vulnerability risks. In their attempts to create secure information exchange systems, scientists have concentrated on understanding the nature and typology of these vulnerabilities. Their efforts aimed at establishing secure networks have led to the development of a variety of methods and techniques for quantifying vulnerability. The objective of the present paper is developing a method based on the second edition of common vulnerability scoring system (CVSS) for the quantification of Computer Network vulnerabilities. It is expected that the proposed model will help in the identification and effective management of vulnerabilities by their quantification.
Full-Text [PDF 498 kb]   (864 Downloads)    
Type of Study: Research | Subject: Library and Information Science
Received: 2014/09/14 | Accepted: 2014/09/14 | Published: 2014/09/14

Add your comments about this article : Your username or Email:
CAPTCHA code

Send email to the article author


© 2018 All Rights Reserved | Journal of Information processing and Management

Designed & Developed by : Yektaweb