Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Currently the problem of monitoring the security of information systems is highly relevant. One of the important security monitoring tasks is to automate the process of determination of the system weaknesses for their further elimination. The paper considers the techniques for analysis of vulnerabil...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Graz University of Technology
2019-09-01
|
Series: | Journal of Universal Computer Science |
Subjects: | |
Online Access: | https://lib.jucs.org/article/22645/download/pdf/ |
id |
doaj-4e4862c6d5484418aef5a52a9b8fa2f9 |
---|---|
record_format |
Article |
spelling |
doaj-4e4862c6d5484418aef5a52a9b8fa2f92021-06-23T07:57:14ZengGraz University of TechnologyJournal of Universal Computer Science0948-69682019-09-012591043106510.3217/jucs-025-09-104322645Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of ExploitsAndrey Fedorchenko0Elena Doynikova1Igor Kotenko2St. Petersburg Institute for Informatics and Automation of the Russian Academy of SciencesSt. Petersburg Institute for Informatics and Automation of the Russian Academy of SciencesSt. Petersburg Institute for Informatics and Automation of the Russian Academy of SciencesCurrently the problem of monitoring the security of information systems is highly relevant. One of the important security monitoring tasks is to automate the process of determination of the system weaknesses for their further elimination. The paper considers the techniques for analysis of vulnerability indexes and exploit source code, as well as their subsequent classification. The suggested approach uses open security sources and incorporates two techniques, depending on the available security data. The first technique is based on the analysis of publicly available vulnerability indexes of the Common Vulnerability Scoring System for vulnerability classification by weaknesses. The second one complements the first one in case if there are exploits but there are no associated vulnerabilities and therefore the indexes for classification are absent. It is based on the analysis of the exploit source code for the features, i.e. indexes, using graph models. The extracted indexes are further used for weakness determination using the first technique. The paper provides the experiments demonstrating an effectiveness and potential of the developed techniques. The obtained results and the methods for their enhancement are discussed.https://lib.jucs.org/article/22645/download/pdf/vulnerability analysisexploit analysisvulnerab |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Andrey Fedorchenko Elena Doynikova Igor Kotenko |
spellingShingle |
Andrey Fedorchenko Elena Doynikova Igor Kotenko Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits Journal of Universal Computer Science vulnerability analysis exploit analysis vulnerab |
author_facet |
Andrey Fedorchenko Elena Doynikova Igor Kotenko |
author_sort |
Andrey Fedorchenko |
title |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
title_short |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
title_full |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
title_fullStr |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
title_full_unstemmed |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
title_sort |
determination of system weaknesses based on the analysis of vulnerability indexes and the source code of exploits |
publisher |
Graz University of Technology |
series |
Journal of Universal Computer Science |
issn |
0948-6968 |
publishDate |
2019-09-01 |
description |
Currently the problem of monitoring the security of information systems is highly relevant. One of the important security monitoring tasks is to automate the process of determination of the system weaknesses for their further elimination. The paper considers the techniques for analysis of vulnerability indexes and exploit source code, as well as their subsequent classification. The suggested approach uses open security sources and incorporates two techniques, depending on the available security data. The first technique is based on the analysis of publicly available vulnerability indexes of the Common Vulnerability Scoring System for vulnerability classification by weaknesses. The second one complements the first one in case if there are exploits but there are no associated vulnerabilities and therefore the indexes for classification are absent. It is based on the analysis of the exploit source code for the features, i.e. indexes, using graph models. The extracted indexes are further used for weakness determination using the first technique. The paper provides the experiments demonstrating an effectiveness and potential of the developed techniques. The obtained results and the methods for their enhancement are discussed. |
topic |
vulnerability analysis exploit analysis vulnerab |
url |
https://lib.jucs.org/article/22645/download/pdf/ |
work_keys_str_mv |
AT andreyfedorchenko determinationofsystemweaknessesbasedontheanalysisofvulnerabilityindexesandthesourcecodeofexploits AT elenadoynikova determinationofsystemweaknessesbasedontheanalysisofvulnerabilityindexesandthesourcecodeofexploits AT igorkotenko determinationofsystemweaknessesbasedontheanalysisofvulnerabilityindexesandthesourcecodeofexploits |
_version_ |
1721362373577539584 |