Ontology Based Security Threat Assessment and Mitigation for Cloud Systems Page: 35
This dissertation is part of the collection entitled: UNT Theses and Dissertations and was provided to UNT Digital Library by the UNT Libraries.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
+ ToplVulnerabiI
ties
ToplOExploitKit + Top1DRansomware
s S
ToplOThreats
ToplDCarnpaigns
owl:Thin j
+ Campaigns - ^ -_ - Threats
ExploitKits
I Ransornwares
Vulnerabilities
FIGURE 3.20. McAfee TLD Ontology High Level View
' + # CVE-2017-16944 37
+CVE-2014-0515
- - -op-O-u-nerabil R-ns-rnwa;eI
- $ CVE-2013-2883
7Top VulTerabil Campaipgns
$ CV-201-1197 esRansornwares
$ CV-201-519 ExloititsTop1DCampa igns
$ E -L.Exploi4i-s
I CVE-2015-167.+ Threats + ToplDRansomware
EoplOExploi4tKi t $CVE-2014-4114
$CVE-2014-0497 ---- -CVE2014-8439
CVE-20E-01-2462
FIGURV3.21. vulnerabilities - KCVE-2014-0556
CVE-213-3993 CVE-2015-3113
$ CV-206-786 ~ ~ -- -- 4CVE-2014-8636
--$-VE-2DT3-W5---------- #CVE-2014-6332
$ CVE201/-ls/3ToplOThreats
It L-VE- 1 26 -- ------ CV E-2 015 -242 6
T 'v-zui-1ur 1 -- $CVE-2013-4074
6
FIGURE 3.21. McAfee TLD Ontology Knowledge Base- Vulnerabilities In-
stances View35
Upcoming Pages
Here’s what’s next.
Search Inside
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Kamongi, Patrick. Ontology Based Security Threat Assessment and Mitigation for Cloud Systems, dissertation, December 2018; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc1404576/m1/48/?rotate=90: accessed July 17, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .