2021
DOI: 10.1007/978-3-030-69514-9_11
|View full text |Cite
|
Sign up to set email alerts
|

CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Regarding the severity of vulnerability nodes being attacked, it is related to the vulnerability severity. The exploitability and severity of each vulnerability are assessed using the Common Vulnerability Scoring System (CVSS) [36], which provides a method for capturing the fundamental characteristics of a vulnerability and assigning it a numerical score that reflects its exploitability and severity.…”
Section: B Strategy Of Searching For Attack Paths and Patch Setsmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding the severity of vulnerability nodes being attacked, it is related to the vulnerability severity. The exploitability and severity of each vulnerability are assessed using the Common Vulnerability Scoring System (CVSS) [36], which provides a method for capturing the fundamental characteristics of a vulnerability and assigning it a numerical score that reflects its exploitability and severity.…”
Section: B Strategy Of Searching For Attack Paths and Patch Setsmentioning
confidence: 99%
“…The vulnerabilities corresponding to CVEs (Common Vulnerabilities and Exposures) are shown in Table II [40]. In CVSS [36], the Base Score serves as an indicator of the severity of a vulnerability based on its intrinsic characteristics, which remain constant over time. Moreover, it assumes a reasonable worst-case scenario in terms of the impact across various deployed environments.…”
Section: A Network Structurementioning
confidence: 99%
“…The second methodology used was the common vulnerability score system, CVSS (2.2), adopted for prioritizing the severity of the potential impact of vulnerabilities. This tool provides a systematic approach to assessing the severity of vulnerabilities using weights [61] ranging from zero to three (no severity and high severity, respectively) and is commonly used with other methodologies such as common vulnerabilities exposure (CVE) [62][63][64]. Therefore, due to not being a tool that classifies or proposes attack vectors, it is very commonly used in conjunction with other threat modeling methodologies (TMMs) during the threat assessment process in a project.…”
mentioning
confidence: 99%