University of Bahrain
Scientific Journals

Prioritizing CWE/SANS and OWASP Vulnerabilities: A Network-Based Model

Show simple item record

dc.contributor.author Mahmood, Basim
dc.date.accessioned 2021-02-09T10:18:35Z
dc.date.available 2021-02-09T10:18:35Z
dc.date.issued 2021-02-08
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/4137
dc.description.abstract Nowadays, software applications have become ubiquitous and a centric need in our life. Most of our business, education, and social activities cannot be performed without software applications. Moreover, the development of software has become the main focus in the market due to the wide variety of customer needs. However, the vast amounts of software that are distributed around the world have dangerous weaknesses and vulnerabilities that can be exploited by cybercriminals to get unauthorized access to users’ data. Thousands of cybercrimes are reported every day around the world due to these vulnerabilities. Therefore, it is critically needed to understand software vulnerabilities and the relations among them aiming at having convenient practices against the dangerous attacks and mitigate their impact. This article analyses the weaknesses that have been defined by the CWE/SANS and OWASP, which are considered as the most trusted and accredited cyber-security organizations. These organizations use a specific scoring system called Common Weakness Scoring System (CWSS) for ranking vulnerabilities based on their frequency of broken and other factors. We involve the concepts of complex networks in the methodology of our analysis. To this end, we generate networks each of which represents the CWE/SANS and OWASP top vulnerabilities issued in a particular year. We, then, analyze the generated networks based on network level and node level measurements. The findings show that CWSS can include centrality measurements for ranking vulnerabilities in a more accurate way. Finally, we believe that centrality measurements can play a significant role and can be considered as a powerful tool in improving CWSS in terms of accuracy. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/4.0/ *
dc.subject Data Analysis, CWE/ SANS and OWASP Vulnerabilities, Complex Networks, Software Security en_US
dc.title Prioritizing CWE/SANS and OWASP Vulnerabilities: A Network-Based Model en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/100137
dc.volume 10 en_US
dc.issue 1 en_US
dc.pagestart 361 en_US
dc.pageend 372 en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authoraffiliation Department of Computer Science, University of Mosul en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International

All Journals


Advanced Search

Browse

Administrator Account