2019
DOI: 10.1109/access.2019.2954092
|View full text |Cite
|
Sign up to set email alerts
|

Unknown Vulnerability Risk Assessment Based on Directed Graph Models: A Survey

Abstract: Nowadays, vulnerability attacks occur frequently. Due to the information asymmetry between attackers and defenders, vulnerabilities can be divided into known and unknown. Existing researches mainly focus on the risk assessment of known vulnerabilities. However, unknown vulnerabilities are more threatening and harder to detect. Therefore, unknown vulnerability risk assessment deserves the widespread attention. To model the exploit process, directed graph models are applied to vulnerability risk assessment. And … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…In recent works, He et al 34 surveyed the use of graph models, including attack graphs and Bayesian networks, to assess risks associated with unknown vulnerabilities. Zimba et al 35 proposed a technique of Bayesian network‐based weighted attack path modeling, including the quantitative characterization of possible attack paths, to capture interlinked attack paths generated by advanced persistent threats upon the exploitation of vulnerabilities of cloud components.…”
Section: Related Workmentioning
confidence: 99%
“…In recent works, He et al 34 surveyed the use of graph models, including attack graphs and Bayesian networks, to assess risks associated with unknown vulnerabilities. Zimba et al 35 proposed a technique of Bayesian network‐based weighted attack path modeling, including the quantitative characterization of possible attack paths, to capture interlinked attack paths generated by advanced persistent threats upon the exploitation of vulnerabilities of cloud components.…”
Section: Related Workmentioning
confidence: 99%
“…The ISA/IEC 62443-4-1 technical document is divided into eight practices, which specify the secure product development life cycle requirements for both the development and the maintenance phases [ 49 ]. The “Practice 5—Security verification and validation testing” (SVV) section of this document specifies that a process shall be employed to identify and characterize potential security vulnerabilities in the product, including known and unknown vulnerabilities [ 50 , 51 ]. Two requirements in Practice 5 are in charge of the task of analyzing vulnerabilities, as follows: Requirement SVV-3.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome the limitations of known vulnerability analysis, many analysis techniques for unknown vulnerabilities have been developed. The study in [ 13 ] showed a solution for unknown vulnerability risk assessment based on directed graphs, which fills the current gap in this research direction of investigation. In [ 14 ], the authors presented a network hardening approach that gives a maximized security solution for unknown and unfixable vulnerabilities by unifying the hardening options under the same model.…”
Section: Related Workmentioning
confidence: 99%