Summary: | 碩士 === 國防大學中正理工學院 === 資訊科學研究所 === 96 === According to National Vulnerability Database, the statistics show that there are seventeen new vulnerabilities published per day. These vulnerabilities found in the operation systems and applications software may be exploited with those unknown attack methods. Users, therefore, have to maintain the latest information of vulnerabilities in order to prevent the systems from being attacked. The vulnerability information can also be used to evaluate the security of the software environments in the cases of constructing new systems via examining operation systems and applications. Our evaluation system can help the users propose the solutions against those potential threats. The information of the security vulnerabilities can be obtained by using our system to analyze the cases of the software combo on new host. Besides, our evaluation also provides other, such as the potential attack methods, the types of the vulnerabilities and the integrated evaluating results. With these, users can evaluate the different combos of the host software selection via comparing the advantages and disadvantages of the combos for choosing the most suitable one. Our evaluation system has another function to evaluate these constructed hosts. The generated evaluation reports can help users understand the vulnerabilities on and the potential risks to their hosts. With referring the information, users can adjust the security configurations of their hosts, deploy some network-security devices for the high risk hosts, and establish the more secure defense strategy.
The main purpose of our research is in evaluating the security of the information systems for constructing and constructed hosts. Our evaluation system is based on the CVSS in NVD database and CVE database. The text mining techniques are also introduced for analyzing the host vulnerabilities leading to the potential risk scenarios. The evaluation results can help users in establishing the security policies in using systems, modifying the configurations of the systems, determining the patching orders of the critical vulnerabilities, selecting the suitable combo of new host, deploying the network security devices to improve the security of the information systems and reduce the risks of being attacked in the intranet or via internet.
|