Abstract
To objectively divide the level of vulnerability severity in Common Vulnerability Scoring System (CVSS), this paper provides a method based on k-means clustering algorithm to improve CVSS and makes it more convictive to evaluate vulnerability. A lot of data as sample are achieved by scoring the severity of the known vulnerabilities according to CVSS, and then these data can be processed by k-means. At last we objectively obtain the ranges of CVSS scores corresponding to every vulnerability severity level, and the results are in keeping with CVSS system basically. So that the proposed method can determine the severity level of a new vulnerability according to the divided scope of CVSS scores objectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Threat and risk assessment working guide. http://www.docin.com/p-105716229.html
Security bulletin severity rating system. http://technet.microsoft.com/en-us/security/gg309177.aspx
Vulnerability notes database field description. http://www.kb.cert.org/vuls/html/fieldhelp
Yang, H., Xie, L., Zhu, D.: A vulnerability severity grey hierarchy analytic evaluation model. J. Univ. Electron. Sci. Technol. China 39, 777–782 (2010)
Zhang, Y., Yun, X., Hu, M.: Research on privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute. J. China Inst. Commun. 25, 107–114 (2004)
Shao, F., Yu, Z.: Principle and Algorithm of Data Mining. China WaterPower Press, Beijing (2003)
K-meansclustering algorithm. http://www.cnblogs.com/jerrylead/archive/2011/04/06/2006910.html
A complete guide to the common vulnerability scoring system version 2.0. http://www.first.org/cvss/cvss-guide.html
Wang, R.: Research on techniques of vulnerability detection and security evaluation based on correlation analysis. Northwest University, pp. 31–34 (2012)
Common vulnerability and exposures. http://cve.mitre.org/
National vulnerability database home. http://nvd.nist.gov/
Acknowledgements
This work is supported by the Hi-Tech Research and Development Program of China under Grant Nos. 2012AA01A404, 2012AA012506, 2012AA01A401, 2012AA012901.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, P., Tian, Z., Wu, X., Liu, W. (2014). An Improved Common Vulnerability Scoring System Based on K-means. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)