Loading [MathJax]/extensions/MathZoom.js
IEEE Xplore Search Results

Showing 1-25 of 2,627 resultsfor

Filter Results

Show

Results

In order to solve the problem that the current network vulnerability assessment is separated from the essence of network defense, a network vulnerability assessment method based on attack graph is proposed. The method utilizes the attack graph to model the network vulnerabilities, defines the network value and threat value and links network vulnerability assessments to network threat values. Furth...Show More
With scale spreading continually and components complicating gradually, security analysis to electric power grid had been a focus. Based on existing researches of electric power grid vulnerability, respectively definitions and new evaluation models of running state vulnerability and structural vulnerability were presented. Then a new evaluation thought combining intensity of state variable and str...Show More
In order to quantify the risk of security vulnerabilities, a vulnerability risk assessment methodology is proposed based on connectivity Operators, and vulnerability relationship is quantitatively analyzed on the use of the vulnerability attack graph. Two kinds of connectivity operator are proposed to calculate the connectivity between vulnerability, achieving a quantitative analysis of the vulner...Show More
With regard to the characterization of structural vulnerability, a new definition of seismic vulnerability index and the corresponding formula are given. The new formula is merely associated with the vulnerability matrix, which shows that the contribution of different damage grade to the vulnerability index is different. Finally, based on earthquake damage matrix, the vulnerability index of three ...Show More
The research technology in these areas has been relatively mature and technological progress has been improved. Bottleneck. Today's mainstream vulnerability scanning systems, when scanning vulnerabilities on very large or complex networks, consume a lot of time and bandwidth costs, but they scan a large number of vulnerabilities that have very low availability. Establishing a full-asset full-vulne...Show More
A dynamic modeling method for network security vulnerabilities which is composed of the design of safety evaluation model, the design of risk model of intrusion event and the design of vulnerability risk model. The model based on identification of vulnerabilities values through dynamic forms can improve the tightness between vulnerability scanning system, intrusion prevention system and security c...Show More
Natural disaster is one of the important factors that restrict regional sustainable development. Therefore, the study of models and tools of disaster vulnerability is a key issue for mitigating the consequences and risks of natural disaster in today's world. The paper takes Fujian province of China as an example to study the application of entropy weight theory in typhoon disaster vulnerability as...Show More
Vulnerability assessment is one of the important topics in cyberspace security, which mainly includes threat assessment, risk level assessment, vulnerability rating score, etc. CVSS (Common Vulnerability Scoring System) is a commonly used vulnerability assessment method in academia and industry. However, CVSS has the following problems. First, CVSS is not very versatile in practical scoring. The v...Show More
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as function-level vulnerability detectors. However, the limitation of this approach is not understood. In this paper, we investigate its limitation in detecting one class of vulnerabilit...Show More
Natural disaster is one of the important factors that restrict regional sustainable development. According to disaster system theory, disaster is the result of disaster-causing factors interacting with hazard-formative environment and hazard-affected bodies, but the vulnerability of hazard-affected bodies will aggravate or lighten the disaster to a certain extent. Therefore, the study of disaster ...Show More
Evolutionary fuzzing technology based on genetic algorithm has become one of the most effective vulnerability discovery techniques due to its fast and scalable advantages. How to effectively mutate the seed input plays a crucial role in improving the efficiency of the fuzzing. A good mutation strategy can increase code coverage and vulnerability triggering probability. Existing fuzzing tools gener...Show More
Flooding occurs almost every year in Jakarta during the rainy season, including earlier this year in 2020. This is considered alarming because the scale of the flooding impact has increased rapidly in recent decades. The increase was related to a number of drivers, both physical (climate change) and socio-economic (population growth). This proposed a new approach based on the impact of both factor...Show More
The paper starts with the study of present methods for evaluation of Vulnerability Threat. It puts forward a new classification method to make up the insufficiency of key elements of assessment. It establish the index system by considering the aspects of time, environment and attack damages and so on. It proposes an assessment method based on Analytic Hierarchy Process (AHP) and fuzzy comprehensiv...Show More
The power industrial control system is an important part of the national critical Information infrastructure. Its security is related to the national strategic security and has become an important target of cyber attacks. In order to solve the problem that the vulnerability detection technology of power industrial control system cannot meet the requirement of non-destructive, this paper proposes a...Show More
At present, most of the software security assessment system can only evaluate the potential impact of a single vulnerability on the system which ignore the impact of the multiple vulnerabilities. Therefore, we introduce the concept of relevance vulnerability pattern and design a relevance vulnerability pattern library taking consider of the potential impact caused by multiple vulnerabilities. Afte...Show More
Ogan Komering Ilir Regency is one of the areas that experienced sever forest fires in 2015. The fire occurred because of the El Nino phenomenon which made the weather conditions dry out and prolonged the dry season. Also, it was caused by forest illegal burning and peatlands to open new land for plantations. According to the regional board of disaster management, known as BPBD data of OKI regency,...Show More
Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be attacked. Early identification of defects has been a widely investigated topic in software engineering research. Early identification of software vulnerabilities can help mitigate these attacks to a large degree by focusing be...Show More
Software vulnerability has long been an important but critical research issue in cybersecurity. Recently, the machine learning (ML)-based approach has attracted increasing interest in the research of software vulnerability detection. However, the detection performance of existing ML-based methods require further improvement. There are two challenges: one is code representation for ML and the other...Show More
In this work, we propose a novel quantitative security metric, VEA-bility, which measures the desirability of different network configurations. An administrator can then use the VEA-bility scores of different configurations to configure a secure network. Based on our findings, we conclude that the VEA-bility can be used to accurately estimate the comparative desirability of a specific network conf...Show More
Vulnerability is associated with the probability of resistance of actions of a threat. A vulnerability exists when a force of threat exceeds the capacity of resistance. Virtualization and its exclusive architecture have numerous features and advantages over non-conventional virtual machines. However, this new uniqueness creates new vulnerabilities and attacks on a cloud system. Assessing the secur...Show More
In view of the problem that the overall security of the network is difficult to evaluate quantitatively, we propose the edge authority attack graph model, which aims to make up for the traditional dependence attack graph to describe the relationship between vulnerability behaviors. This paper proposed a network security metrics based on probability, and proposes a network vulnerability algorithm b...Show More
We collected a large C/C++ code vulnerability dataset from open-source Github projects, namely Big-Vul. We crawled the public Common Vulnerabilities and Exposures (CVE) database and CVE-related source code repositories. Specifically, we collected the descriptive information of the vulnerabilities from the CVE database, e.g., CVE IDs, CVE severity scores, and CVE summaries. With the CVE information...Show More
Preventing software vulnerabilities while writing code is one of the most effective ways for avoiding cyber attacks on any developed system. Although developers follow some standard guiding principles for ensuring secure code, the code can still have security bottlenecks and be compromised by an attacker. Therefore, assessing software security while developing code can help developers in writing v...Show More
With the rapid development of the electric power Internet-of-Things (power IoT) technology and the widespread use of general-purpose software, hardware and network facilities, the power IoT has become more and more open, which makes the traditional power system face new cyber security threats. In order to find the vulnerable device nodes and attack links in the power IoT system, this paper studies...Show More
In order to improve the overall security operation of smart grid, this paper designs a holistic vulnerability measure method for smart grid control system that integrated with its topology properties and security protection capabilities. More detailed, the method can intensively assess its vulnerability through the featured indexes, i.e., the inherent topological vulnerability indexes in terms of ...Show More