2021
DOI: 10.5815/ijeme.2021.03.02
|View full text |Cite
|
Sign up to set email alerts
|

A New Vulnerability Reporting Framework for Software Vulnerability Databases

Abstract: Cyber security is one of the fundamental research areas of software engineering. The systems that make up today's information systems infrastructure have been developed largely with software support. Security vulnerabilities in the software used in these systems may cause undesirable results. It is very important to manage software vulnerabilities correctly. In addition, an effective communication mechanism and certain standards should be established among those working in this field. The importance of the sub… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The vulnerability framework proposed in [26] can't detect the vulnerable big data applications submitted by the users of the big data cluster. It needs for new approaches to detect the flaws by processing these vulnerable big data apps and its logs.…”
Section: Related Workmentioning
confidence: 99%
“…The vulnerability framework proposed in [26] can't detect the vulnerable big data applications submitted by the users of the big data cluster. It needs for new approaches to detect the flaws by processing these vulnerable big data apps and its logs.…”
Section: Related Workmentioning
confidence: 99%
“…Various proposed "ontological techniques" are considered, as well as comprehensive analysis of various models to ensure the safety of the cloud environment [4][5][6][7]. Much work has been done to identify and analyze software vulnerabilities, methods for reporting and classifying software security vulnerabilities [8][9][10][11][12]. Specific features of information protection focus on existing methods of localization of anomalies and current hazards in networks, statistical methods are considered as effective methods of detecting anomalies and experimental detection of the chosen method, methods of capturing and analyzing network traffic during passive monitoring of network segment [13][14][15][16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…The main task of NVD staff is to analyze the vulnerability lists published in the CVE dictionary. At this stage, they use all the additional data they can collect the explanations and references found in the CVE [20,21]. As a basis for the data published in the NVD database, associated impact metrics (Common Vulnerability Scoring System -CVSS), vulnerability types (Common Vulnerability Enumeration -CWE), applicability statements (Common Platform Enumeration -CPE) and other relevant metadata are added.…”
Section: Database Usedmentioning
confidence: 99%