CONSTRUCTION OF INTEGRATED BASE OF VULNERABILITIES
St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Laboratory of Computer Security Problems; Junior Scientist
A. A. Chechulin
St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Laboratory of Computer Security Problems;
I. V. Kotenko
St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Laboratory of Computer Security Problems ; Professor
Read the full article
Abstract. Results of analysis of open databases of vulnerabilities are presented. The process of the bases integration in evaluation system of computer networks security is described. A model of the base formation process and structure of integrated base of vulnerabilities is proposed.
Keywords:
security evaluation, database of vulnerabilities, security monitoring system