There are full of challenges to score vulnerabilities of cloud services developed by different third-party pro-viders.Although there have been a few systems for scoring vulnerabilities (e.g.
CVSS) of many existing software
most of them are unable to be leveraged to score vulnerabilities in cloud services
because they fail to consider some important factors located in the clouds such as business context (i.e.
dependency relationships between services).VScorer
a novel security frame work to score vulnerabilities in various cloud services were presented based on different given require-ments.By inputting concrete business context and security requirement into VScorer
cloud provider can get a ranking list of vulnerabilities in the business based on the given security requirement.Following the ranking list
cloud provider was able to patch the most critical vulnerabilities first.A prototype was developed and VScorer can be demonstrazed to work better than current representative vulnerability scoring system CVSS.
关键词
Keywords
references
RISTENPART T , TROMER E , SHACHAM H , et al . Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds [C ] // ACM Conference on Computer and Communications Se-curity . c 2009 : 199 - 212 .
BELLOVIN S . On the brittleness of software and the infeasibility of security metrics [J ] . IEEE Security and Privacy , 2006 , 4 ( 4 ): 96 - .
BOZORGI M , SAUL L , SAVAGE , et al . Beyond heuristics:learning to classify vulnerabilities and predict exploits [C ] // ACM Sigkdd Inter-national Conference on Knowledge Discovery & Data Mining . ACM , c 2010 : 105 - 114 .
IBM . IBM Internet Security Systems X-Force 2008 Trend and Risk Report [R ] . White paper , 2009 .
A complete guide to the common vulnerability scoring system [S ] .
OWASP Top Ten [EB/OL ] . http://www.owasp.org/,2013. http://www.owasp.org/,2013. , 2003 .
CHEN X , ZHANG M , MAO Z , et al . Automating network application dependency discovery:Experiences,limitations,and new solu-tions [C ] // Usenix Symposium on Operating Systems Design & Im-plementation . c 2008 : 117 - 130 .
ENSEL C . A scalable approach to automated service dependency modeling in heterogeneous environments [C ] // IEEE International En-terprise Distributed Object Computing Conference . c 2001 : 128 - 139 .
DOUGHERTY C . Vulnerability metric [EB/OL ] . https://www.se-curecoding.cert.org/confluence/display/seccode/Vulnerability+Metric https://www.se-curecoding.cert.org/confluence/display/seccode/Vulnerability+Metric , c 2008 , 07 , 24 .
SAWILLA R OU X . Identifying critical attack assets in depend-ency attack graphs [C ] // European Symposium on Computer Secu-rity-esorics . c 2008 : 18 - 34 .
OSVDB . The open source vulnerability database [S ] .
CVE Editorial Board . Common vulnerabilities and exposures:the standard for information security vulnerability names [S ] .
GYONGYI Z , GARCIA H , PEDERSEN J . GARCIA H,PEDERSEN J.Combating web spam with trustrank [C ] // Thirtieth International Conference on Very Large Data Bases . c 2010 : 576 - 587 .
CHRISTOS T . Software for Cloud [S ] .
SCARFONE K MELL P . An analysis of cvss version 2 vulnerabil-ity scoring [C ] // FDTC 2013 . International Symposium on Empirical Software Engi-neering & Measurement c 2009 : 516 - 525 .
FRUHWIRTH C MANNISTO T . Improving cvss-based vulnerability prioritization and response with context information [C ] // ESEM . International Symposium on Empirical Software Engi-neering & Measurement c 2009 : 535 - 544 .
MOORE D SHANNON C CLAFFY K . A case study on the spread and victims of an Internet worm [C ] // ESEM . Internet Measurement Workshop c 2002 : 273 - 284 .