skip to main content
10.1145/1852666.1852699acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Vulnerability categorization using Bayesian networks

Published:21 April 2010Publication History

ABSTRACT

This paper proposes a novel model and methodology to classify and categorize vulnerabilities according to their security types. We use Bayesian networks to automate the process. An example is provided to demonstrate the process of categorization. The automatically generated result is compared to the CVE type in NVD [6], and it proved the correctness of our method.

Skip Supplemental Material Section

Supplemental Material

References

  1. M. Bishop. A taxonomy of UNIX system and network vulnerabilities. Technical Report CSE-9510. Davis: Department of Computer Science, University of California; 1995.Google ScholarGoogle Scholar
  2. I. V. Krsul. Software vulnerability analysis. Available from: http://www.krsul.org/ivan/articles/main.pdf; May 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. S. Venter and J. H. P. Eloff. Harmonising vulnerability categories. South African Computer Journal, 29, 2002.Google ScholarGoogle Scholar
  4. H. S. Venter, J. H. P. Eloff, Y. L. Li. Standardising Vulnerability Categories. Computers & Security, 27, p71--83, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Melanie Tupper. A Comparison of Word Frequency and N-Gram Based Vulnerability Categorization Using SOM.Google ScholarGoogle Scholar
  6. National Vulnerability Database. CWE Cross Section Mapped into by NVD. Available from: http://nvd.nist.gov/cwe.cfm; March 2010.Google ScholarGoogle Scholar
  7. J. A. Wang, H. Wang, M. Guo, L. Zhou and J. Camargo, Ranking Attacks Based on Vulnerability Analysis, in Proceedings of the 43rd Annual Hawaii International Conference on System Sciences. Published by the IEEE Computer Society, ISBN: 978-0-7695-3869-3; ISSN 1530--1605. January 5--8, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. A. Wang, L. Zhou, M. Guo, H. Wang, and J. Camargo, Measuring Similarity for Security Vulnerabilities, in Proceedings of the 43rd Annual Hawaii International Conference on System Sciences. Published by the IEEE Computer Society, ISBN: 978-0-7695-3869-3; ISSN 1530--1605. January 5--8, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. A. Wang, Minzhe Guo, Hao Wang, Min Xia, and Lingfeng Zhou, Ontology-based Security Assessment for Software Products, in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, ISBN 978-1-60558-518-5, Oak Ridge, TN, April 13--15, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. A. Wang, M. Guo, and J. Camargo, An Ontological Approach to Computer System Security, Information Security Journal: A Global Perspective, V.19 N.2:61--73, 2010. ISSN: 1939--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nir Friedman, Dan Geiger, and Moises Goldszmidt, Bayesian Network Classifiers, Machine Learning, V. 29, N. 2--3, Nov/Dec. 1997, pages: 131--163. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Vulnerability categorization using Bayesian networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
        April 2010
        257 pages
        ISBN:9781450300179
        DOI:10.1145/1852666

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader