International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
In order to gain trusted system detection and remediation of vulnerability is crucial. In computer network to solve the problem of security vulnerability, study of vulnerability is essential to know cause of vulnerability. By considering the characteristics and behavior of known vulnerabilities the authors can improve the security evaluation procedure. The information about known vulnerability can be used to design an appropriate taxonomy that can be further used in investigating new system and also for identifying unidentified vulnerabilities. Several attempts have been made for producing such taxonomies.