Research on key technology of vulnerability threat classification

In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification...

Full description

Saved in:
Bibliographic Details
Main Authors: Qi-xu LIU, Chong-bin ZHANG, Yu-qing ZHANG, Bao-feng ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539872544784384
author Qi-xu LIU
Chong-bin ZHANG
Yu-qing ZHANG
Bao-feng ZHANG
author_facet Qi-xu LIU
Chong-bin ZHANG
Yu-qing ZHANG
Bao-feng ZHANG
author_sort Qi-xu LIU
collection DOAJ
description In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification model,which can divide vulnerabilities into four risk levels:critical,high,moderate and low.The method provides a reference for national standard,vulnerability management,vulnerability handling,risk assessment,risk mitigation,etc.
format Article
id doaj-art-86aacbc4cc0a4b05ab6bf7b01ffa7c9c
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-86aacbc4cc0a4b05ab6bf7b01ffa7c9c2025-01-14T06:33:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-0133798759667302Research on key technology of vulnerability threat classificationQi-xu LIUChong-bin ZHANGYu-qing ZHANGBao-feng ZHANGIn order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification model,which can divide vulnerabilities into four risk levels:critical,high,moderate and low.The method provides a reference for national standard,vulnerability management,vulnerability handling,risk assessment,risk mitigation,etc.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/information securityvulnerabilityvulnerability evaluationvulnerability management
spellingShingle Qi-xu LIU
Chong-bin ZHANG
Yu-qing ZHANG
Bao-feng ZHANG
Research on key technology of vulnerability threat classification
Tongxin xuebao
information security
vulnerability
vulnerability evaluation
vulnerability management
title Research on key technology of vulnerability threat classification
title_full Research on key technology of vulnerability threat classification
title_fullStr Research on key technology of vulnerability threat classification
title_full_unstemmed Research on key technology of vulnerability threat classification
title_short Research on key technology of vulnerability threat classification
title_sort research on key technology of vulnerability threat classification
topic information security
vulnerability
vulnerability evaluation
vulnerability management
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/
work_keys_str_mv AT qixuliu researchonkeytechnologyofvulnerabilitythreatclassification
AT chongbinzhang researchonkeytechnologyofvulnerabilitythreatclassification
AT yuqingzhang researchonkeytechnologyofvulnerabilitythreatclassification
AT baofengzhang researchonkeytechnologyofvulnerabilitythreatclassification