[Home ] [Archive]   [ فارسی ]  
:: Volume 29, Issue 4 (10-2014) ::
2014, 29(4): 1107-1145 Back to browse issues page
A computational method based on CVSS for quantifying the vulnerabilities in computer network
Shahriyar Mohammadi , Mohammad Hossein Sherkat , Mona Jami pour
Assistant professor Khajeh Nasir Toosi University
Abstract:   (3998 Views)
Network vulnerability taxonomy has become increasingly important in the area of information and data exchange not only for its potential use in identification of vulnerabilities but also in their assessment and prioritization. Computer networks play an important role in information and communication infrastructure. However, they are constantly exposed to a variety of vulnerability risks. In their attempts to create secure information exchange systems, scientists have concentrated on understanding the nature and typology of these vulnerabilities. Their efforts aimed at establishing secure networks have led to the development of a variety of methods and techniques for quantifying vulnerability. The objective of the present paper is developing a method based on the second edition of common vulnerability scoring system (CVSS) for the quantification of Computer Network vulnerabilities. It is expected that the proposed model will help in the identification and effective management of vulnerabilities by their quantification.
Keywords: Vulnerability, Computer Network Vulnerability, Taxonomy of Vulnerabilities, ITU-TX-805 Security Architecture, Quantifying Vulnerabilities, Common Vulnerability Scoring System.
Full-Text [PDF 498 kb]   (810 Downloads)    
Type of Study: Research | Subject: Library and Information Science
Received: 2014/09/14 | Accepted: 2014/09/14 | Published: 2014/09/14
Send email to the article author

Add your comments about this article
Your username or Email:


XML   Persian Abstract   Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Mohammadi S, Sherkat M H, Jami pour M. A computational method based on CVSS for quantifying the vulnerabilities in computer network . Journal of Information Processing and Management. 2014; 29 (4) :1107-1145
URL: http://jipm.irandoc.ac.ir/article-1-2608-en.html

Volume 29, Issue 4 (10-2014) Back to browse issues page
پژوهشنامه پردازش و مدیریت اطلاعات Journal of Information processing and Management
Persian site map - English site map - Created in 0.27 seconds with 30 queries by YEKTAWEB 3730