2017
DOI: 10.1515/eletel-2017-0044
|View full text |Cite
|
Sign up to set email alerts
|

Trust and Risk Assessment Model of Popular Software Based on Known Vulnerabilities

Abstract: Abstract-This paper presents a new concept of an approach to risk assessment which can be done on the basis of publicly available information about vulnerabilities. The presented approach uses also the notion of trust and implements many concepts used in so called trust and reputation management systems (which are widely used in WSN, MANET or P2P networks, but also in ecommerce platforms). The article shows first outcomes obtained from the presented model. The outcomes demonstrate that the model can be impleme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Another not obvious application is the analysis and monitoring of the quality (in the context of cybersecurity) of vendors or their products, which may allow predicting the existence of new unknown vulnerabilities. Such a concept, although not dedicated to the IoT world, can be found in the article [ 6 ]. From the perspective of IoT devices, such prospects can be even more important and more promising.…”
Section: General Aim and Approachmentioning
confidence: 99%
“…Another not obvious application is the analysis and monitoring of the quality (in the context of cybersecurity) of vendors or their products, which may allow predicting the existence of new unknown vulnerabilities. Such a concept, although not dedicated to the IoT world, can be found in the article [ 6 ]. From the perspective of IoT devices, such prospects can be even more important and more promising.…”
Section: General Aim and Approachmentioning
confidence: 99%
“…When the cracker finds a new vulnerability (so called "0-day"), they try to exploit it to generate benefits, instead of informing the vendor. Therefore, unknown vulnerabilities are associated with an enormous potential to compromise system security [1]. The vulnerability management system should support the system administrator in two areas.…”
Section: Vulnerabilitiesmentioning
confidence: 99%
“…Secondly, the vulnerability management system should assess the technical risks associated with the software used. This risk stems from the existing security vulnerabilities [1]. Technical vulnerability databases are very important, but they contain information about well-known vulnerabilities only (mainly those for which patches have been released).…”
Section: Vulnerabilitiesmentioning
confidence: 99%
See 2 more Smart Citations