An Implementation of an Vulnerability Management in Complex Networks and Defining Severity
Keywords:
Network, VMPAbstract
Complex systems are found in an extensive variety of areas from technological and social to biological environments. In spite of this scope of uses and settings in which complex systems are utilized as models, examines propose that numerous genuine systems are represented by a comparable elements. An important characteristic is that in general such networks are robust against failures but vulnerable against targeted attacks. Impossible to miss trademark: resilience. In this technological era business endeavor to stay aware of evolving technology, it implies that they have a high capacity to absorb changes. However, resilience mechanisms are not present per se in technological networks. Thus, this work presents a framework for vulnerability assessment, vulnerability analysis and vulnerability management in versatile technological networks
References
“CWE- Common Weakness Enumeration”,Available: http://nvd.nist.gov/
“NVD Data Feed and Product Integration”, National Vulnerability Database, Available: http://nvd.nist.gov/download.cfm
N. W. Adger,“Vulnerability,” Global Environmental Change, no. 3, pp. 268–281, August.
A. Reka, J. Hawoong, and B. Albert-Laszlo,“Error and attack tolerance of complex networks,” Nature, no. 6794, pp. 378–382, July.
“CVE, Common Vulnerabilities and Exposures.” http://cve.mitre.org/
http://www.tenable.com/products/nessus
M.E.J. Newman "Analysis of weighted networks", The American Physical Society.
“The OVAL Language.” http://oval.mitre.org/ - Open vulnerability and assessment language.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.