2021
DOI: 10.1007/978-3-030-77967-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Algorithms for Conversion of CVSS Base Score from 2.0 to 3.x

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Namely, for each class corresponding to a particular value of the CVSS 3.x vector component, one has a widely varying number of CVSS 2.0 vectors that map onto it. For instance, to the CVSS 3.x vector AV component class N map 841 CVSS 2.0 vectors, while to class P 53732 CVSS 2.0 vectors [ 37 ].…”
Section: Research Conceptmentioning
confidence: 99%
See 3 more Smart Citations
“…Namely, for each class corresponding to a particular value of the CVSS 3.x vector component, one has a widely varying number of CVSS 2.0 vectors that map onto it. For instance, to the CVSS 3.x vector AV component class N map 841 CVSS 2.0 vectors, while to class P 53732 CVSS 2.0 vectors [ 37 ].…”
Section: Research Conceptmentioning
confidence: 99%
“…Therefore, a proprietary undersampling method as described in [ 37 ] was used to obtain a more balanced training set. Using the undersampling method, a common training set was created from the extended CVSS 2.0 vectors, assuming that, for each class of the CVSS 3.x vector component, we selected only 80 corresponding CVSS 2.0 vectors.…”
Section: Research Conceptmentioning
confidence: 99%
See 2 more Smart Citations
“…The Common Vulnerability Scoring System (CVSS) classifies the severity of disclosed vulnerabilities [5]. Nowadays, CVSS has undergone three revisions: (i) v1 in 2004 [24], (ii) v2, which includes the CVSS score metric [25], and (iii) v3.1 was published in 2015 for enhancing the process of establishing vulnerability criticality [26]. On the other hand, CWE is a community-developed project to classify security bugs as a list of common software and hardware weaknesses.…”
Section: Introductionmentioning
confidence: 99%