Software vulnerabilities are potential attack points in computing systems that can lead to considerable losses and severe security incidents. The way in which the information describing these vulnerabilities is handled is extremely important. Vulnerability data is very sensitive and therefore should be disclosed to the right people in the right circumstances. However, information sharing is currently mostly unidirectional; the present paper discusses a new approach for handling software vulnerability information: a cooperative system supported by a vulnerability classification. The system is composed by internal protocols that determine state transitions through which new vulnerability information is submitted, classified, verified, and made available via a Web Interface. Based on features like effects and nature, vulnerabilities in the collection can also be assigned a type. The proposed type system is a set of sub-classes that contain features of well-known vulnerability groups. Vulnerabilities can be linked together through these types and can be referenced as a group when retrieving or storing entries, hereby, speeding up the process. A voting mechanism allows a set of cooperating arbiters to review the information submitted from different sources. Approved descriptions of vulnerabilities can then be made available to the members of the cooperative system. The data model storing the vulnerability information is composed of a comprehensive set of features whose values are selected through decision trees. The leaves of the trees represent the most detailed qualities of a vulnerability.
[1]
Catherine A. Meadows.
An outline of a taxonomy of computer security research and development
,
1993,
NSPW '92-93.
[2]
Duane Buck,et al.
Design early considered harmful: graduated exposure to complexity and structure based on levels of cognitive development
,
2000,
SIGCSE '00.
[3]
Eugene H. Spafford,et al.
Computer Vulnerability Analysis
,
1998
.
[4]
Carl E. Landwehr,et al.
A taxonomy of computer program security flaws
,
1993,
CSUR.
[5]
Curtis R. Cook,et al.
A taxonomy for programming style
,
1990,
CSC '90.
[6]
Eugene H. Spafford,et al.
Software vulnerability analysis
,
1998
.