ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2017, Vol. 54 ›› Issue (10): 2296-2309.doi: 10.7544/issn1000-1239.2017.20170457

Previous Articles     Next Articles

A System for Scoring the Exploitability of Vulnerability Based Types

Lei Kenan1,2, Zhang Yuqing1,2, Wu Chensi2, Ma Hua3   

  1. 1(State Key Laboratory of Integrated Services Networks (Xidian University), Xi’an 710071); 2(National Computer Network Intrusion Protection Center (University of Chinese Academy of Sciences), Beijing 101408); 3(School of Mathematics and Statistics, Xidian University, Xi’an 710071)
  • Online:2017-10-01

Abstract: As is known to all, vulnerabilities play an extremely important role in network security now. Accurately quantizing the exploitability of a vulnerability is critical to the attack-graph based analysis of network information system security. Currently the most widely used assessment system for vulnerability exploitability is the common vulnerability scoring system (CVSS). Firstly, the exploitability scores of 54331 vulnerabilities are computed by using CVSS. Then, statistical analysis is performed on the computed exploitability scores, which indicates that CVSS lacks diversity, and more diverse results can help end-users prioritize vulnerabilities and fix those that pose the greatest risks at first. Statistical results show that the scores are too centralized as well. Finally, taking into account the disadvantages of CVSS, we study the influence factors of vulnerability exploitability, and demonstrate that the types of a vulnerability can influence its exploitability. Therefore, we consider vulnerability types as one of the influence factors of vulnerability exploitability, and use analytic hierarchy process to quantify it, and propose a more comprehensive quantitative evaluation system named exploitability of vulnerability scoring systems (EOVSS) based on CVSS. Experiments show that the diversity of scores computed by EOVSS is four times that computed by CVSS, and EOVSS can more accurately and effectively quantify the exploitability of a vulnerability in comparison with CVSS.

Key words: vulnerability, exploitability, vulnerability type, analytic hierarchy process, quantification

CLC Number: