Abstract
To evaluate the security situation of Windows systems for different users on different security attributes, this paper proposes a quantitative assessment method based on vulnerability relationship graph (VRG) and an index-based assessment policy. Through introducing the correlative influences of vulnerabilities, VRG can be used to scientifically detect high risk vulnerabilities which can evoke multistage attacks although their threats on surface are very little. Analysis of 1085 vulnerabilities indicates that for trusted remote visitors, the security of Windows systems is lower while for distrusted remote visitors, they are relatively secure. But there is no obvious difference of the security risk on confidentiality, authenticity and availability of Windows systems. In several known versions, the security of Windows NT is almost lowest.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Michener, J.: System Insecurity in the Internet Age. IEEE Software 16(4), 62–69 (1999)
Jiwnani, K., Zelkowitz, M.: Maintaining Software with A Security Perspective. In: ICSM 2002, Montréal, pp. 194–203 (2002)
Hedbom, H., Lindskog, S., Axelsson, S., Jonsson, E.: A Comparison of the Security of Windows NT and UNIX. In: Third Nordic Workshop on Secure IT Systems (November 1998)
Wang, L.D.: Quantitative Security Risk Assessment Method for Computer System and Network (In Chinese). Ph.D. Thesis, Harbin Institute of Technology (2002)
Zhang, Y.Z., Yun, X.C.: A New Vulnerability Taxonomy Based on Privilege Escalation. In: Proceedings of the 6th ICEIS, vol. 3, pp. 596–600 (2004)
Fang, B.X.: Network and Information Security, and Its Novel Technology (2001), http://pact518.hit.edu.cn/view/view/frame.htm
Schneier, B.: Attack Trees. Dr. Dobb’s Journal 24(12), 21–29 (1999)
Zhang, Y.Z., Yun, X.C., Fang, B.X.(eds.): A Mining Method for Computer Vulnerability Correlation. Int. J. Innovative Computing, Information and Control. 1(1), 43–51 (2005)
SecurityFocus: Bugtraq (2005), http://www.securityfocus.com/bid/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Y., Fang, B., Chi, Y., Yun, X. (2005). Assessment of Windows System Security Using Vulnerability Relationship Graph. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_60
Download citation
DOI: https://doi.org/10.1007/11596981_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)