Welcome to Journal of University of Chinese Academy of Sciences,Today is

Journal of University of Chinese Academy of Sciences ›› 2024, Vol. 41 ›› Issue (6): 842-852.DOI: 10.7523/j.ucas.2023.037

• Research Articles • Previous Articles    

Vulnerability exploitability assessment method based on network environment

ZHENG Jinghua, KAI Shaofeng, SHI Fan   

  1. College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
  • Received:2022-11-22 Revised:2023-04-07

Abstract: The common vulnerability scoring system is the most widely used vulnerability evaluation method, but its evaluation results tend to be the harmfulness of the vulnerability itself, ignoring the network environment factors. In view of the above problems, we propose a network environment-oriented vulnerability exploitability assessment method. Based on the experience of group experts, using statistical methods to select vulnerability attributes, the vulnerability exploitability assessment metric system is constructed. And combined with the target environment attributes, this method can evaluate the vulnerability exploitability based on the K-nearest neighbor (KNN) algorithm. This method performs accurate and intelligent assessment of known and unknown vulnerabilities, integrating the impact of the target environment and reducing the reliance on expert experience. At last, we validate the method through experiments. Our method provides a scientific decision-making basis for network security protection measures.

Key words: cybersecurity, vulnerability assessment, exploitability, metric parsimony, machine learning

CLC Number: