Research Article
An Approach for Internal Network Security Metric Based on Attack Probability
Table 2
The CVSS metric method of individual vulnerabilities.
| Name | Degree of difficulty | Indicator value | Description |
| AC | High | 1 | The vulnerability is very difficult to use | Medium | 2 | The vulnerability is a little difficult to use | Low | 3 | The vulnerability is easy to use | AU | Multiple | 1 | The vulnerability is difficult to use | Single | 2 | Vulnerability is a little difficult to use | None | 3 | The vulnerability is easy to use | AV | Local | 1 | The vulnerability only can be used locally and difficulty | Adjacent network | 2 | The vulnerability can be used and is harder to use | Network | 3 | The vulnerability can be exploited remotely and easily |
|
|