2018 28th International Telecommunication Networks and Applications Conference (ITNAC) 2018
DOI: 10.1109/atnac.2018.8615386
|View full text |Cite
|
Sign up to set email alerts
|

Security threat probability computation using Markov Chain and Common Vulnerability Scoring System

Abstract: Security metrics have become essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative method, or compliance checking and this renders the outcome far from accurate. This paper proposes a novel approach to compute the probability distribution of cloud security threats based on Markov chain and Common Vulnerability Scoring System (CVSS). The paper gives an applicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Adopting this uniform vocabulary will be beneficial for the evaluation of IT vulnerabilities, IT administrators, vulnerability bulletin providers, security companies, application vendors, and researchers [ 29 ]. For instance, a graph theory-based security threat model is presented by [ 30 ]. They used a Markov chain to discover attack vectors through several security threats in a model with three states for this purpose.…”
Section: Preliminariesmentioning
confidence: 99%
“…Adopting this uniform vocabulary will be beneficial for the evaluation of IT vulnerabilities, IT administrators, vulnerability bulletin providers, security companies, application vendors, and researchers [ 29 ]. For instance, a graph theory-based security threat model is presented by [ 30 ]. They used a Markov chain to discover attack vectors through several security threats in a model with three states for this purpose.…”
Section: Preliminariesmentioning
confidence: 99%
“…. By applying the suggested mechanism, we focus on the observable and measurable states and develop three states [27].…”
Section: Ree-state Markov Modelmentioning
confidence: 99%
“…Johnson et al [13] compare the credibility of the CVSS scoring data of different vulnerability sources of NVD, X-Force, OSVDB, CERT-VN, and Cisco. Le and Hoang [16] propose an approach to compute the probability distribution of cloud security threats based on Markov chains and the CVSS.…”
Section: Risk Assessment Approachesmentioning
confidence: 99%