Common Vulnerability Scoring System for SDN Environment
Raktim Deb1, Sudipta Roy2

1Raktim Deb*, Department of CSE, Assam University, Silchar, India.
2Sudipta Roy, Department of CSE, Assam University, Silchar, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 4022-4029 | Volume-8 Issue-6, August 2019. | Retrieval Number:F9302088619/2019©BEIESP | DOI: 10.35940/ijeat.F9302.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The identification of component vulnerability is an important criterion for securing the networks and it is an open issue for Software Defined Network (SDN). The First.org provides an open tool namely Common Vulnerability Scoring system for identification of component vulnerability, but there is no distinctive correspondence between CVSS and SDN. With this paper, we try to identify such correspondence so that it will help network researchers to determine the network vulnerability and improve the SDN security soon. This paper also includes a comparison between the last three CVSS versions. For this comparison, one can understand what are the new features CVSS incorporating for identifying new vulnerabilities in the emerging environment.
Keywords: SDN, OpenFlow, CVSS 3, Metrics Group