Quantitative risk assessment under multi-context environments

dc.contributor.authorZhang, Su
dc.date.accessioned2014-11-04T19:48:36Z
dc.date.available2014-11-04T19:48:36Z
dc.date.graduationmonthDecember
dc.date.issued2014-11-04
dc.date.published2014
dc.description.abstractIf you cannot measure it, you cannot improve it. Quantifying security with metrics is important not only because we want to have a scoring system to track our efforts in hardening cyber environments, but also because current labor resources cannot administrate the exponentially enlarged network without a feasible risk prioritization methodology. Unlike height, weight or temperature, risk from vulnerabilities is sophisticated to assess and the assessment is heavily context-dependent. Existing vulnerability assessment methodologies (e.g. CVSS scoring system, etc) mainly focus on the evaluation over intrinsic risk of individual vulnerabilities without taking their contexts into consideration. Vulnerability assessment over network usually output one aggregated metric indicating the security level of each host. However, none of these work captures the severity change of each individual vulnerabilities under different contexts. I have captured a number of such contexts for vulnerability assessment. For example, the correlation of vulnerabilities belonging to the same application should be considered while aggregating their risk scores. At system level, a vulnerability detected on a highly depended library code should be assigned with a higher risk metric than a vulnerability on a rarely used client side application, even when the two have the same intrinsic risk. Similarly at cloud environment, vulnerabilities with higher prevalences deserve more attention. Besides, zero-day vulnerabilities are largely utilized by attackers therefore should not be ignored while assessing the risks. Historical vulnerability information at application level can be used to predict underground risks. To assess vulnerability with a higher accuracy, feasibility, scalability and efficiency, I developed a systematic vulnerability assessment approach under each of these contexts. ​
dc.description.advisorXinming (Simon) Ou
dc.description.degreeDoctor of Philosophy
dc.description.departmentDepartment of Computing and Information Sciences
dc.description.levelDoctoral
dc.description.sponsorshipAir Force Office of Scientific Research U.S. National Science Foundation
dc.identifier.urihttp://hdl.handle.net/2097/18634
dc.language.isoen_US
dc.publisherKansas State University
dc.rights© the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectVulnerability assessment
dc.subjectQuantitative risk assessment
dc.subjectCloud computing security
dc.subjectZero-day vulnerability assessment
dc.subjectSoftware dependency risk assessment
dc.subjectNetwork security (attack graph)
dc.subject.umiComputer Science (0984)
dc.titleQuantitative risk assessment under multi-context environments
dc.typeDissertation

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
SuZhang2014.pdf
Size:
2.21 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: