Techniques are provided to quantify the security impact of network vulnerabilities (e.g., hardware, software, configuration, etc.) on network applications running in the network and vice versa. The security impact quantification may be calculated by combining the vulnerability reach index (i.e. how far in the network does the impact of a vulnerability extend) with the security breach probability (i.e. the probability of accessing the network elements belonging to one network application from another network application).
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Anantha, Swami; Patil, Santosh; Pularikkal, Byju; and Chakraborty, Sourav, "APPLICATIONS ON TOP OF DNA CENTER: NETWORK SECURITY SCORE BY NETWORK APPLICATION SEGMENTS", Technical Disclosure Commons, (June 25, 2018)