WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/10011009,
	  title     = {SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment},
	  author    = {Wenqing Fan and  Yixuan Cheng and  Wei Huang},
	  country	= {},
	  institution	= {},
	  abstract     = {The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.
},
	    journal   = {International Journal of Information and Communication Engineering},
	  volume    = {14},
	  number    = {1},
	  year      = {2020},
	  pages     = {16 - 23},
	  ee        = {https://publications.waset.org/pdf/10011009},
	  url   	= {https://publications.waset.org/vol/157},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 157, 2020},
	}