Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

Table 2

Hosts configuration and vulnerabilities information in network.

HostServiceCVE #Vulnerability descriptionACPXWeightImpactDisclosure date

M1apacheCVE 2014-0098Causing a denial of serviceLow0.12.903/18/2014

M2postgresqlCVE 2014-0063Executing arbitrary codeMid0.26.403/31/2014

M3LinuxCVE 2014-0038Allowing local users to gain root privilegesHigh0.110.002/06/2014
ms-officeCVE 2013-1324Causing stack-based buffer overflow in Microsoft officeLow0.110.011/12/2013

M4bmcCVE 2013-4782Causing bypass authenticationLow0.210.007/08/2013

M5radiusCVE 2014-1878Causing segmentation faultLow0.32.902/28/2014