Research on key technology of vulnerability threat classification
In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539872544784384 |
---|---|
author | Qi-xu LIU Chong-bin ZHANG Yu-qing ZHANG Bao-feng ZHANG |
author_facet | Qi-xu LIU Chong-bin ZHANG Yu-qing ZHANG Bao-feng ZHANG |
author_sort | Qi-xu LIU |
collection | DOAJ |
description | In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification model,which can divide vulnerabilities into four risk levels:critical,high,moderate and low.The method provides a reference for national standard,vulnerability management,vulnerability handling,risk assessment,risk mitigation,etc. |
format | Article |
id | doaj-art-86aacbc4cc0a4b05ab6bf7b01ffa7c9c |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-86aacbc4cc0a4b05ab6bf7b01ffa7c9c2025-01-14T06:33:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-0133798759667302Research on key technology of vulnerability threat classificationQi-xu LIUChong-bin ZHANGYu-qing ZHANGBao-feng ZHANGIn order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification model,which can divide vulnerabilities into four risk levels:critical,high,moderate and low.The method provides a reference for national standard,vulnerability management,vulnerability handling,risk assessment,risk mitigation,etc.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/information securityvulnerabilityvulnerability evaluationvulnerability management |
spellingShingle | Qi-xu LIU Chong-bin ZHANG Yu-qing ZHANG Bao-feng ZHANG Research on key technology of vulnerability threat classification Tongxin xuebao information security vulnerability vulnerability evaluation vulnerability management |
title | Research on key technology of vulnerability threat classification |
title_full | Research on key technology of vulnerability threat classification |
title_fullStr | Research on key technology of vulnerability threat classification |
title_full_unstemmed | Research on key technology of vulnerability threat classification |
title_short | Research on key technology of vulnerability threat classification |
title_sort | research on key technology of vulnerability threat classification |
topic | information security vulnerability vulnerability evaluation vulnerability management |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/ |
work_keys_str_mv | AT qixuliu researchonkeytechnologyofvulnerabilitythreatclassification AT chongbinzhang researchonkeytechnologyofvulnerabilitythreatclassification AT yuqingzhang researchonkeytechnologyofvulnerabilitythreatclassification AT baofengzhang researchonkeytechnologyofvulnerabilitythreatclassification |