2011 Seventh International Conference on Signal Image Technology &Amp; Internet-Based Systems 2011
DOI: 10.1109/sitis.2011.24
|View full text |Cite
|
Sign up to set email alerts
|

CVSS Attack Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…If λ is zero, the solution reduces to the OLS estimates, and when λ → ∞, all coefficients inβ b tend to zero. Despite of the overdispersion, the Gaussian LASSO in (7) can be accompanied with a Poisson LASSO as an additional robustness check.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…If λ is zero, the solution reduces to the OLS estimates, and when λ → ∞, all coefficients inβ b tend to zero. Despite of the overdispersion, the Gaussian LASSO in (7) can be accompanied with a Poisson LASSO as an additional robustness check.…”
Section: Resultsmentioning
confidence: 99%
“…CVSS is also widely used in academic research. Typical application domains include risk analysis [2,14], security audit frameworks [4], so-called attack graphs [7,26], and empirical assessments using CVSS for different purposes [1,25,31,33]. To these ends, a lot of work has been done to improve CVSS with different weighting algorithms [17,40], among other techniques [9,30].…”
Section: Introductionmentioning
confidence: 99%
“…This approach models the relationships between vulnerabilities using attack graphs, converting CVSS scores into probabilities [22]- [27]. In this way, both the CVSS value and the place of the vulnerability in the whole graph are taken into account.…”
Section: B Attack Graph-based Aggregationmentioning
confidence: 99%
“…For example, a pre-condition of the "buffer overflow" vulnerability could be "execution stack by overwriting the stored return address, the stack pointer or the frame pointer". Whereas, Postcondition(s) [10] represent the results of an activated threat. For example, the results of a "buffer overflow: could be an "unauthorized access to system".…”
Section: A Sossec Abstract and Concrete Syntaxesmentioning
confidence: 99%
“…1) It is rare that an attacker exploits a single vulnerability on a single target system to achieve its objective, in most cases he uses several single attacks on several systems to accomplish his attack [10]. 2) "The consequences of attacks on the SoS cannot be understood by means of the merely evaluation of the behavior of the single systems, but require an assessment of the effect of the inter-dependencies on the behavior of the whole SoS" [11].…”
Section: Introductionmentioning
confidence: 99%