• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Selecting Best Software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS

    2022-08-24 07:02:06NavneetBhattJasmineKaurAdarshAnandandOmarAlhazmi
    Computers Materials&Continua 2022年8期

    Navneet Bhatt,Jasmine Kaur,Adarsh Anand and Omar H.Alhazmi

    1Anil Surendra Modi School of Commerce,Narsee Monjee Institute of Management Studies,Deemed to be University,Mumbai,400056,India

    2Department of Operational Research,Faculty of Mathematical Sciences,University of Delhi,Delhi,110007,India

    3Department of Computer Science,Taibah University,Medina,30001,Saudi Arabia

    Abstract: Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability scanners,are available in the market which helps detect and manage vulnerabilities in a computer,application,or a network.Hence,the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management.The current work serves a dual purpose,first,to identify the key factors which affect the vulnerability discovery process in a network.The second,is to rank the popular vulnerability scanners based on the identified attributes.This will aid the firm in determining the best scanner for them considering multiple aspects.The multi-criterion decision making based ranking approach has been discussed using the Intuitionistic Fuzzy set(IFS)and Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)to rank the various scanners.Using IFS TOPSIS,the opinion of a whole group could be simultaneously considered in the vulnerability scanner selection.In this study,five popular vulnerability scanners,namely,Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose have been considered.The inputs of industry specialists i.e.,people who deal in software security and vulnerability management process have been taken for the ranking process.Using the proposed methodology,a hierarchical classification of the various vulnerability scanners could be achieved.The clear enumeration of the steps allows for easy adaptability of the model to varied situations.This study will help product developers become aware of the needs of the market and design better scanners.And from the user’s point of view,it will help the system administrators in deciding which scanner to deploy depending on the company’s needs and preferences.The current work is the first to use a Multi Criterion Group Decision Making technique in vulnerability scanner selection.

    Keywords: Intuitionistic fuzzy set;group decision making;multi-criteria decision making (MCDM);ranking algorithm;software security;TOPSIS;vulnerability;vulnerability scanners

    1 Introduction

    Secure software is not an overnight creation.Like any other good quality product,it requires careful planning,scrutiny,wise decision-making,and efficient implementation throughout the life cycle.The adage‘Prevention is better than cure’holds in this context too and investing in each phase of the software development lifecycle(SDLC)to prevent the rise of security loopholes is much better than handling an issue when it arises.Any flaw which endangers the data,functionality and accessibility of software is considered a security threat.A security threat can be mitigated through efficient testing and an effective update and upgrade policy.Various types of testing such as vulnerability scanning,penetration testing,security scanning,risk assessment,security auditing,posture assessment,and ethical hacking are carried out to ensure software security.Tools like dynamic application security testing (DAST) and static application security testing (SAST) are commonly used for this purpose.According to The State of Application Security,2020 report,software vulnerabilities and application weakness are the two major causes of an external attack on software[1].

    A software vulnerability is a security threat that arises due to a bug,or a fault discovered in the operational phase of the software lifecycle.They are the potentially exploitable loopholes in the software caused due to insufficient testing,bad coding practices,compatibility issues arising due to new code addition in an upgrade,etc.A typical vulnerability undergoes the following lifecycle:it gets injected,detected,exposed,exploited,and patched.The types of vulnerabilities include Cross-Site Scripting,Buffer overflow,Path Traversal,SQL Injection,Command Injection,Open Redirect,etc.Common Vulnerability Scoring System(CVSS)is the most widely used system to assign a value to the severity of each vulnerability on a scale of 1 to 10 with 10 being the most severe.Common Vulnerability and Exposures (CVE),owned by Mitre organization also issues a unique CVE id to each known vulnerability using which the detailed information about its type,severity,impact,etc.can be obtained.The CVE database has known records of 151,798 vulnerabilities to date.According to National Vulnerability Database(NVD),17220 vulnerabilities were reported in 2019 alone.Windows operating system and Chrome browser were deemed to be the most vulnerable in their respective category.This information about the vulnerabilities lies in the public domain and can be easily accessed by anyone.Hence,mitigating or eliminating vulnerabilities from the system is a time-sensitive issue.An efficient vulnerability management plan is required which handles the vulnerability before it is exploited.In April 2021,530 million records of personal data from Facebook were released publically.The breach occurred back in August 2019 by exploiting a vulnerability.Even though the vulnerability was fixed by the company in the same month,the data breach had already occurred.

    Vulnerability management involves identifying a vulnerability,classifying it and preventing its exploitation.A lot of effort and resources are put in to identify vulnerabilities.Many bounty hunting programs are financed by firms to detect vulnerabilities in their software.White hat hackers proactively work on detecting and ethically reporting them.Patching service is the most common approach to mitigate or remove the vulnerability from the system.

    Vulnerability scanning is the first step in the process of vulnerability detection which are automated processes that detect vulnerabilities or weaknesses in a network,web application,system,and database.Each scanner has a database of the known vulnerabilities,and it compares the detected flaw with the database entries to determine the vulnerability type and then patch it.Various categories of vulnerability scanners are available like network-based scanners,database scanners,host-based scanners,application scanners and wireless scanners.

    In the recent time,lot of firms are coming up with software which necessitates the use of vulnerability scanners to keep them safe.Choosing the right vulnerability scanner is a very difficult and important decision.Different surveys tend to focus on different parameters.Certain websites such as Gartner Peer Insights and g2.com provide a comparative performance evaluation of vulnerability scanners,usually based on popular opinions and peer reviews [2,3].According to the Cybersecurity Insiders’2018 Application Security Report,Tenable Inc.’s Nessus is the most adopted vulnerability scanner followed by Qualys and then Rapid 7.Tenable was a sponsor of this survey [4,5].The top results of an internet search for vulnerability scanning software are the numerous lists by varied websites for the“top 10”,“top 15”,“best”,“paid”and“free”vulnerability scanners.The definitions,the working,and the purpose of the vulnerability scanners come much later in the search results.This points to the high demand for such a ranking and also to the lack of a single comprehensive,industrystandard list.The proposed work aims to rectify it.

    Decision making is a very complex process that requires taking care of multiple factors simultaneously.Manual evaluation or intuition-based decision making is not always reliable as some factor or the other tends to get overlooked.Making multiple decisions can also lead to decision fatigue which results in inadequate decisions.Hence,the need for a mathematical approach arises which is unbiased,thorough,and precise.Decision science is the subject that deals with such problems.It provides tools that make data-driven decisions.Multi-Criteria Decision Making (MCDM) is one of the popular decision-making approaches.It allows the decision maker to obtain an optimal solution considering multiple conflicting factors simultaneously.Analytical Hierarchy Process(AHP),Data Envelopment Analysis (DEA),éLimination et Choix Traduisant la REalité (ELECTRE),Vlsekriterijumska Optimizacija I Kompromisno Resenje(VIKOR),TOPSIS,Multi Attribute Utility Theory(MAUT),Fuzzy Set Theory,Goal Programming,Preference Ranking Organization Method for Enrichment Evaluation(PROMETHEE)are some of the commonly used MCDM techniques[6].

    The current work uses TOPSIS in combination with Intuitionistic Fuzzy Set to obtain a ranking for the vulnerability scanners.TOPSIS was proposed by Hwang and Yoon[7].It determines a positive ideal solution and negative ideal solution and then using different distance measures,determines the optimal solution to be the one with the least distance from the positive ideal solution and farthest from the negative ideal solution.The intuitionistic fuzzy set is an extension of the set theory provided by Georg Cantor in the late 1700 s.Intuitionistic Fuzzy Set Theory was proposed by Krassimir Atanassov in 1983[8].According to the classical set theory,an element either belongs to a set or doesn’t.But this theory was not able to cater to the uncertainty involved in many real-life situations.The Intuitionistic Fuzzy Set Theory allowed for a third component which deals with uncertainty.Hence,the set describes the membership function,a non-membership function,and a hesitation function.IFS TOPSIS uses intuitionistic fuzzy set in TOPSIS method to define a real-life situation.

    A brief literature review has been provided in the following Section 2.Section 3 first discusses the methodology of IFS TOPSIS and is followed by a detailed description of the problem in the context of vulnerability scanners.Section 4 discusses a particular case for ranking a few vulnerability scanners.The results have been discussed in Section 5 while Section 6 concludes the work and is followed by a reference list.

    2 Literature Review

    Many vulnerability discovery models have been proposed by researchers which have contributed to vulnerability management literature.These models validated the vulnerability data based on their discovery timeline and then can be used to predict the future vulnerabilities to be discovered[9-18].Some works have proposed vulnerability correction through patch management[19-23].Researchers have also proposed vulnerability scoring and assessment techniques[24-27].

    In contrast to the available mathematical models,software developers have worked on the development of various vulnerability scanning software that can ease the discovery process by just checking the source code or byte code in predeveloped software.Vulnerability Scanning Tools(VST)are automated tools that inspect various types of software vulnerabilities present in a web application and network.Fonseca et al.have compared the capability of various vulnerability scanners in detecting SQL injection and Cross-Site Scripting Vulnerabilities [28].Bau et al.assessed the performance of various black box vulnerability scanners [29].Holm et al.have evaluated the effectiveness of various vulnerability scanners [30].Daud et al.have discussed a case study on the web application scanner tools used in their company [31].Makino and Klyuev evaluated the performance of two vulnerability scanners,OWASP ZAP and Skipfish[32].Alsaleh et al.performed a comparative analysis to assess open-source vulnerability scanners[33].Esposito et al.proposed a tool JARVIS to enhance the performance of existing vulnerability scanners [34].Rennhard et al.proposed a tool JARVIS to overcome the limitations of currently available vulnerability scanners [35].As can be seen,the related research content in vulnerability domain contains very less or precisely no work pertaining to vulnerability scanner identification from multi criterion decision making point of view.The present work is an attempt in this very direction.

    IFS TOPSIS has been used to propose a ranking technique for vulnerability scanners.TOPSIS is a popularly used MCDM technique with good applications in varied fields.Roszkowska has shown the application of TOPSIS on varied types of input data[36].Zavadskas et al.have provided a very comprehensive literature review of the use and implementation of the TOPSIS method [37].Avikal et al.used TOPSIS along with Fuzzy AHP to rank the power supply source for telecom towers[38].IFS TOPSIS has been also used quite often as a ranking and selection technique.Boran et al.used it for supplier selection in the supply chain [39].Boran et al.used it for the evaluation of renewable energy techniques [40].Büyük?zkan and Güleryüz used it for smartphone selection [41].Sachdeva et al.used IFS TOPSIS for the selection of cloud solutions for big data projects[42].Gupta et al.used it to determine the most important attribute of software quality throughout its lifecycle[43].Different variants of Intuitionistic fuzzy set have also been used like Shen et al.proposed a different distance measure and also used it for credit risk assessment[44].

    The above literature review highlights the gap in the current work done regarding vulnerability scanners.In this respect,an IFS TOPSIS based model has been proposed which will rank the various vulnerability scanners.For this,the methodology has been developed in the following section.

    3 Building Block of the Model

    3.1 Intuitionistic Fuzzy Set

    The intuitionistic fuzzy set M on a set Y is defined as follows:

    where]μM(y):Y→[0,1]denotes the membership function andvM(y):Y→[0,1]denotes the non-membership function given that:

    The uncertainty or hesitation or non-determinacy of an elementy∈Yis given by

    The functionπM(y)caters to the uncertainty regarding the membership ofywhere a smaller value of the function gives us more certainty aboutyand vice versa.In our problem of determining the best vulnerability scanner,the uncertainty function deals with the uncertainty or incomplete information regarding the responses of the decision makers about the various scanners.

    3.2 Intuitionistic Fuzzy Set TOPSIS

    The IFS TOPSIS combines the principles of Intuitionistic Fuzzy Set and TOPSIS to create a selection and ranking approach.The methodology of IFS TOPSIS has been provided by Boran et al.[39].The general steps followed have been enumerated in the following Tab.1.

    Table 1:Methodology of IFS TOPSIS

    In the current framework,the above-stated methodology has been used to obtain a hierarchical list of the different vulnerability scanners available in the market.It can be obtained as follows:

    For the current study,letE={E1,E2,...,Em}denote the set ofmalternatives i.e.,the vulnerability scanners available to the decision makers.According to a list by OWASP,there are more than 60 vulnerability scanners currently available in the market[45].There are different alternatives available for different platforms,some are commercial while others have a free license.The list has also been segregated on the availability of a free version or not.

    Many factors affect the choice of a particular product.For vulnerability scanners,its performance i.e.,issue tracking ability,detection rate,type of testing,network scanning ability,ease of use,false positives,price,etc.are crucial factors [3].In this work,the following seven criteria associated with a good vulnerability scanner have been determined after exhaustive literature review and discussion with security specialists.

    LetY={Y1,Y2,...,Yn} denote the criteria that are used to determine the best vulnerability scanner.

    1.Static application security testing:The SAST is a testing process that looks at the application from the inside out.It performs an examination of source code,byte code,or application binaries for any sign of vulnerabilities.A scanner that performs efficient SAST testing is considered to be more efficient.

    2.Dynamic application security testing:The DAST looks at the application from the outside in,by examining it in its running state and trying to manipulate it to discover security vulnerabilities.

    3.Network and Endpoint Security:It refers to the technologies that are used to keep the network and the devices that connect to the network in secure working order.

    4.Vulnerability Repository/Coverage:A vulnerability repository represents different types of vulnerabilities a scanning tool may discover.

    5.Ease of Use:The extent to which software can be used by specified users to achieve specified goals with effectiveness,efficiency,and satisfaction in a specified context of use.

    6.Detection rate:It represents how many vulnerabilities did the vulnerability scanners detect in a given time period.

    7.Technological coverage:It represents multi-language support provided to access the security of applications based on various platforms.

    The steps of the algorithm have been discussed below in detail:

    Step I.Determine the weights for each decision maker

    In each firm,there is a team for software security administration.All decisions regarding the choices of security software like antivirus,vulnerability scanners,firewall,anti-spyware,SaaS security,payment gateway software,etc.are made by the security administrators.Hence,the choice of the vulnerability scanners is made by this team,and they are the decision makers in the current study.Not all members in the team hold equal importance and the value of their opinion may vary due to their knowledge,experience,position,etc.The IFS TOPSIS can cater to this,and weightage is assigned to the opinion of each decision maker in the group.The rating for each decision maker is taken on a linguistic scale and converted into an intuitionistic fuzzy number as shown in Tab.2.

    Table 2:Linguistic terms and their corresponding Intuitionistic fuzzy number for decision maker[39]

    Let L denote the number of decision makers,thenDMk=[μk,vk,πk]denotes the intuitionistic fuzzy number for kthdecision maker and the corresponding weight can be obtained as:

    Step II.Create the aggregated intuitionistic fuzzy decision matrix

    The linguistic input of the decision makers regarding the various alternatives can be converted into Intuitionistic fuzzy number using Tab.3.Letbe an intuitionistic fuzzy decision matrix for the kthdecision maker created on the basis of the inputs given by a decision maker regarding themalternatives on thencriteria.

    Table 3:Linguistic terms and the corresponding intuitionistic fuzzy number to rank the alternatives and create the decision matrix[39]

    Letλ={λ1,λ2,...,λL}denote the weights associated with each decision maker.The opinions of all the decision makers needs to be aggregated to obtain a group opinion.Hence,IFWA by Xu [46]has been deployed.Then,such that:

    Hence,the aggregated decision matrix containing the weighted opinions of all the decision makers is:

    Step III.Determine the weights of each criterion

    As is the case with decision makers,all the criteria under consideration may not bear the same level of importance.Let W represent the importance level which is obtained by aggregating the weights assigned by each decision maker.Letbe the intuitionistic fuzzy number pertaining to criteria j assigned by decision maker k.Then,using the IFWA operator,the criteria weight can be obtained as:

    Hence,the matrix is

    Step IV.Create the aggregated weighted intuitionistic fuzzy decision matrix

    Using the aggregated decision matrix obtained in Step II and weights matrix obtained in Step III,the aggregated weighted intuitionistic fuzzy decision matrix is determined as given by[8]as:

    Thus,the aggregated weighted intuitionistic fuzzy decision matrix is:

    Step V.Determine the distances from the intuitionistic fuzzy positive and negative ideal solution

    LetJ1andJ2be the benefit and cost criteria respectively i.e.,a higher value of attributesJ1is desirable while a lower value of attributesJ2is appreciated.LetE+be the intuitionistic fuzzy positive ideal solution i.e.,andE-be the intuitionistic fuzzy negative ideal solution i.e.,where

    Step VI.Calculate the separation measures

    The separation measures are obtained using the normalized Euclidean distance as described by[39]as:

    and

    whereD+denotes the distance from the intuitionistic fuzzy positive ideal solution andD-denotes the distance from the intuitionistic fuzzy negative ideal solution.

    Step VII.Determine the relative proximity coefficient to the intuitionistic ideal solution

    The relative proximity coefficient of an alternativeEito the intuitionistic fuzzy positive ideal solutionE+is obtained as:

    Step VIII.Rank the alternatives

    Using the proximity values obtained in step VII,the alternative with the highest value ofPi+is given the highest rank,and so on.Thus,the ranking for the various vulnerability scanners is attained.

    4 Model Illustration

    To demonstrate the working of the above-discussed algorithm,five vulnerability scanners have been considered in the study,namely Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose.A brief description about them is given below:

    Nessus:Nessus is a proprietary vulnerability scanner by Tenable,Inc.and is one of the most popularly used scanners.It has a web interface and a server component that performs the scanning.Firstly,port scanning takes place which detects which hosts are alive and further which ports are open on those hosts.This is followed by service detection which detects which application is running on that port,its name and version number.Then the discovered information is compared with the known vulnerabilities to determine the vulnerability present in the network.Then further probing takes place to identify whether it is a false positive or the vulnerability exists.Nessus is a remote scanning tool and runs numerous checks to detect malicious activity over the network.It covers a wide range of technologies including operating systems,network devices,hypervisors,databases,web servers,and critical infrastructure[4].

    Fsecure Radar:Fsecure Radar uses cloud-based management which provides high level automation.It scans the deep web along with the network and its assets.It has built-in features like a security center dashboard,internet asset discovery,discovery scans,vulnerability scans,vulnerability management,etc.The company was founded in 1988 and has received awards for its tool[47].

    Greenbone:Greenbone is an open-source solution for vulnerability analysis and management.It identifies security risks in corporate IT,assesses their risk potential and recommends actions.The goal is to prevent attacks by targeting precautionary measures.The company provides a Source Edition,a Professional Edition and Cloud Services[48].

    Qualys:Qualys provides products like Qualys Cloud Platform and Cloud Agent.The Qualys Web Application Scanner(WAS)scanner provides deep scans using Simple Object Access Protocol(SOAP)and Representational State Transfer(REST)-based Application Programming Interfaces(APIs).The scanner performs exhaustive testing using DevOps and Agile-based techniques to remove malware and other issues.WAS backed by the Cloud-based Platform and their Web App Firewall allows for comprehensive security solutions[49].

    Nexpose:Nexpose is an on-premise vulnerability scanner offered by Rapid 7.The twenty-year-old organization offers many tools,among which the Nexpose can handle vulnerabilities very quickly in a rapidly changing environment.It is considered to be easy to use and points out the areas which need the most attention[50].

    The opinions of three decision makers about the above-mentioned vulnerability scanners were collected through a questionnaire.The questionnaire was designed in such a way that the input of the decision maker was marked against each criteria’s individual importance as well as the importance of the criteria in a particular scanner.

    Thus,m=5 denotes the alternatives,n=7 denotes the 7 attributes discussed in the earlier section,andL=3 denotes the 3 decision makers.

    Step I.Determine the weights for each decision maker

    The weightage assigned to decision makers is shown in the following Tab.4.

    Table 4:Decision maker’s weight

    The linguistic terms for each decision maker as shown in Tab.4 can be converted to intuitionistic fuzzy numbers using Tab.2.Further,evaluating Eq.(5) gives us the corresponding weights for each decision maker as:

    Step II.Create the aggregated intuitionistic fuzzy decision matrix

    The input of each decision maker regarding the various attributes is shown in Tab.5.

    Table 5:Importance of each alternative

    Table 5:Continued

    Using the inputs from Tab.5 and evaluating Eqs.(6)-(8),the aggregated intuitionistic fuzzy decision matrix is obtained as:

    Step III:Determine the weights of each criterion

    To determine the importance of each criterion,the input of each decision maker was taken(Tab.6)and an aggregated importance matrix was created with the use of Eqs.(10)-(12).

    Table 6:Importance of each criterion

    Thus,the weight matrix W is:

    Step IV:Create the aggregated weighted intuitionistic fuzzy decision matrix

    The aggregated weighted intuitionistic fuzzy decision matrix is obtained using Eqs.(14)-(16)as:

    Step V:Determine the distances from the intuitionistic fuzzy positive and negative ideal solution

    The intuitionistic fuzzy positive ideal and intuitionistic fuzzy negative ideal solution have been obtained here with the help of Eqs.(17)-(20).

    The intuitionistic fuzzy positive ideal solution obtain is:

    And the intuitionistic fuzzy negative ideal solution is:

    Step VI:Calculate the separation measures

    The separation measures can be obtained using Eqs.(21)-(22) and the values are shown in following Tab.7:

    Table 7:Separation measures for the alternatives

    Table 7:Continued

    Step VII:Determine the relative proximity coefficient to the intuitionistic ideal solution

    The relative proximityPi+is shown in the second row of Tab.8.

    Table 8:Ranking and proximity co-efficient of the alternatives

    Step VIII:Rank the alternatives

    Since the proximity coefficient is highest for Qualys,it is ranked as the best and is followed by Nexpose and Nessus.

    Thus,a ranking for the five considered alternatives based on the opinion of the expert group could be obtained.

    5 Discussion

    5.1 Research Contribution

    As can be seen from the results obtained in the earlier section,a comprehensive ranking of the considered scanners could be obtained.IFS TOPSIS was able to consider the opinions of various decision makers and obtain a collective decision.The relative importance of each decision maker was also given relevant weightage.The technique was further able to consider various attributes and consider their relative importance.According to the results obtained here,Qualys is the best vulnerability scanner followed by Nexpose,Nessus,Fsecure Radar and Greenbone.This contrasts with the report discussed earlier wherein Nessus topped the list and was followed by Qualys.This shows that the results can vary as per the attributes under consideration and hence a mathematical model is a better fit in such a situation.

    5.2 Limitations and Future Research Directions

    The current analysis has been carried out based on the inputs received from three decision makers who have worked on multiple vulnerability scanners.The decision makers were asked to express their views regarding five vulnerability scanners.The number of decision makers is usually considered small in such group-based decision-making approaches.The number of products analyzed can be extended depending on the problem under consideration.It can be further seen that the results obtained here are based on the opinion of the decision makers.Different views of the decision makers or the administrators might lead to a different outcome.Hence,this research work is scale-independent and can be implemented by a single firm,by a group of organizations,or by the whole software industry to determine the benchmark.Detailed enumeration of the steps with discussions will facilitate the easy application to the problem and hence obtain a tailor-fit solution each time.The technique can also be used to analyze and rank other aspects of vulnerability management and improve software security.

    6 Conclusion

    Security is a major concern for any software whether it is an application,an operating system,or a network.Vulnerabilities crop up in software when there are loopholes and can be exploited for wrongful gains.Vulnerability Scanning Software help in detecting vulnerabilities automatically in a web-based application and network.But due to the numerous vulnerability scanners available in the market,each with its unique features,choosing the right scanner becomes a precarious decision.For this,a multi-criteria group decision making approach i.e.,Intuitionistic Fuzzy Set TOPSIS has been used to select the best scanner and also provide a ranking to different scanners.To assess the vulnerability scanner,the study identified seven parameters whose presence is essential in good quality software.A highlighting feature of IFS TOPSIS is that it can cater to different importance assigned to different things in a group and yet make a group decision.Different members of the decisionmaking group can hold varying levels of importance.Similarly,the criteria of judging a scanner can hold a varying level of importance for a particular firm/individual or in a particular scanner.This group decision making approach can combine the varying perspectives and present a joint outcome.To demonstrate the working of the discussed technique,the analysis was carried out on five vulnerability scanners based on inputs from a group of three decision makers.The technique was able to successfully rank the scanners.

    Acknowledgement:The authors would like to thank Mr.Lokesh Tiwari,Information Security Engineer at Intel Tech.India Private Limited,Bangalore,India;and his team members who helped us in filling questionnaire regarding our study.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男女下面插进去视频免费观看| 中文字幕人妻丝袜一区二区| 黑人操中国人逼视频| 午夜老司机福利片| 热99re8久久精品国产| 免费av中文字幕在线| 人妻丰满熟妇av一区二区三区| 亚洲一区中文字幕在线| 动漫黄色视频在线观看| 亚洲精品一二三| а√天堂www在线а√下载| 久久性视频一级片| 国产精品一区二区在线不卡| 一区二区三区激情视频| 另类亚洲欧美激情| 欧美激情高清一区二区三区| 18禁黄网站禁片午夜丰满| 亚洲欧洲精品一区二区精品久久久| 国产精品久久久久成人av| 国产成人欧美| 免费av毛片视频| 亚洲欧美一区二区三区黑人| 桃色一区二区三区在线观看| av电影中文网址| 免费在线观看影片大全网站| 啦啦啦 在线观看视频| 十八禁人妻一区二区| √禁漫天堂资源中文www| 热99国产精品久久久久久7| 欧美亚洲日本最大视频资源| 国产蜜桃级精品一区二区三区| 精品免费久久久久久久清纯| 国产麻豆69| 淫妇啪啪啪对白视频| 亚洲欧美日韩另类电影网站| 国产av在哪里看| 欧美日韩av久久| 香蕉丝袜av| 久久99一区二区三区| 日韩一卡2卡3卡4卡2021年| 日日摸夜夜添夜夜添小说| 日韩中文字幕欧美一区二区| 另类亚洲欧美激情| 免费人成视频x8x8入口观看| 欧美中文综合在线视频| 777久久人妻少妇嫩草av网站| 村上凉子中文字幕在线| 少妇裸体淫交视频免费看高清 | av天堂久久9| 国产成人免费无遮挡视频| 一级毛片女人18水好多| 男男h啪啪无遮挡| 妹子高潮喷水视频| 国产精品国产av在线观看| 日本a在线网址| 在线观看日韩欧美| 成人精品一区二区免费| 波多野结衣av一区二区av| 国产精品爽爽va在线观看网站 | 天堂动漫精品| 欧美人与性动交α欧美精品济南到| 国产aⅴ精品一区二区三区波| 午夜激情av网站| 日韩 欧美 亚洲 中文字幕| 琪琪午夜伦伦电影理论片6080| 黑丝袜美女国产一区| 久久人妻福利社区极品人妻图片| 亚洲国产精品一区二区三区在线| 婷婷丁香在线五月| 国产精品一区二区精品视频观看| 久久精品国产亚洲av香蕉五月| 亚洲av第一区精品v没综合| 很黄的视频免费| 看免费av毛片| 神马国产精品三级电影在线观看 | 老司机亚洲免费影院| 久久久国产欧美日韩av| 欧美成人性av电影在线观看| 久久精品国产99精品国产亚洲性色 | 大型av网站在线播放| 久久久久久亚洲精品国产蜜桃av| 亚洲va日本ⅴa欧美va伊人久久| av天堂在线播放| 国产免费现黄频在线看| 女人精品久久久久毛片| 欧美精品啪啪一区二区三区| 精品一品国产午夜福利视频| 久久久久九九精品影院| 国产亚洲欧美98| 熟女少妇亚洲综合色aaa.| aaaaa片日本免费| 国产成人影院久久av| a在线观看视频网站| 热99re8久久精品国产| 精品久久蜜臀av无| 一边摸一边抽搐一进一出视频| 国产一区在线观看成人免费| 99riav亚洲国产免费| 色尼玛亚洲综合影院| 亚洲欧美日韩另类电影网站| 国产精品国产av在线观看| 亚洲熟妇熟女久久| 亚洲午夜精品一区,二区,三区| 看免费av毛片| 99国产精品一区二区三区| 丝袜在线中文字幕| 免费看a级黄色片| 在线观看一区二区三区| 多毛熟女@视频| 无人区码免费观看不卡| 我的亚洲天堂| 精品少妇一区二区三区视频日本电影| 久久久久亚洲av毛片大全| 一区二区日韩欧美中文字幕| 国产黄a三级三级三级人| 亚洲黑人精品在线| 90打野战视频偷拍视频| 欧美激情高清一区二区三区| 亚洲国产欧美网| 淫妇啪啪啪对白视频| 人成视频在线观看免费观看| 一级,二级,三级黄色视频| 国产成人影院久久av| e午夜精品久久久久久久| 99久久综合精品五月天人人| 日韩大尺度精品在线看网址 | 极品人妻少妇av视频| 久久久久久久久免费视频了| 成人特级黄色片久久久久久久| 老熟妇仑乱视频hdxx| 12—13女人毛片做爰片一| 99久久人妻综合| 国产又色又爽无遮挡免费看| 欧美激情 高清一区二区三区| 午夜亚洲福利在线播放| 午夜老司机福利片| 女性被躁到高潮视频| 啦啦啦免费观看视频1| 久久99一区二区三区| 在线播放国产精品三级| 身体一侧抽搐| 俄罗斯特黄特色一大片| 法律面前人人平等表现在哪些方面| 精品少妇一区二区三区视频日本电影| 国产午夜精品久久久久久| 一区在线观看完整版| 欧美最黄视频在线播放免费 | 视频在线观看一区二区三区| 精品国内亚洲2022精品成人| 久久人人精品亚洲av| 视频区欧美日本亚洲| 国产精品秋霞免费鲁丝片| 一级毛片女人18水好多| 欧美在线黄色| 久久精品亚洲av国产电影网| 无限看片的www在线观看| 久久狼人影院| 亚洲五月天丁香| 制服人妻中文乱码| 亚洲精品成人av观看孕妇| 天堂动漫精品| 色综合欧美亚洲国产小说| 欧美日韩精品网址| 91精品三级在线观看| aaaaa片日本免费| 美女国产高潮福利片在线看| 国产精品二区激情视频| 久久久国产成人精品二区 | 一级,二级,三级黄色视频| 亚洲精品国产色婷婷电影| 久久精品91蜜桃| 五月开心婷婷网| 国产极品粉嫩免费观看在线| 成年版毛片免费区| 黄色视频不卡| 中文字幕色久视频| 在线观看免费视频日本深夜| 嫩草影院精品99| 老司机午夜福利在线观看视频| 777久久人妻少妇嫩草av网站| 日韩欧美三级三区| 在线av久久热| 九色亚洲精品在线播放| 国产一区二区三区综合在线观看| 久久久国产成人精品二区 | 成人黄色视频免费在线看| 色播在线永久视频| 午夜福利一区二区在线看| 久久性视频一级片| 欧美 亚洲 国产 日韩一| 美女午夜性视频免费| www.www免费av| 丁香六月欧美| av欧美777| 国产黄色免费在线视频| 一区二区三区国产精品乱码| 丰满的人妻完整版| 一区在线观看完整版| 91九色精品人成在线观看| 国产真人三级小视频在线观看| 一级,二级,三级黄色视频| 看免费av毛片| 亚洲片人在线观看| 女警被强在线播放| 777久久人妻少妇嫩草av网站| 亚洲av美国av| 在线av久久热| 999精品在线视频| 久久久国产精品麻豆| 中出人妻视频一区二区| 亚洲一区二区三区色噜噜 | 黄片播放在线免费| 巨乳人妻的诱惑在线观看| 大香蕉久久成人网| 91在线观看av| 亚洲精品美女久久久久99蜜臀| 色婷婷av一区二区三区视频| 真人做人爱边吃奶动态| 视频在线观看一区二区三区| 黄色片一级片一级黄色片| 脱女人内裤的视频| 老司机靠b影院| 欧美日本中文国产一区发布| 欧美色视频一区免费| 人妻丰满熟妇av一区二区三区| 国产无遮挡羞羞视频在线观看| 欧美黄色片欧美黄色片| 超色免费av| 欧美久久黑人一区二区| 国产99白浆流出| 国产欧美日韩精品亚洲av| 成人黄色视频免费在线看| 国产1区2区3区精品| 悠悠久久av| 最近最新中文字幕大全免费视频| 香蕉久久夜色| 淫秽高清视频在线观看| 日日夜夜操网爽| 国产高清videossex| 亚洲色图av天堂| 视频区欧美日本亚洲| 亚洲第一欧美日韩一区二区三区| 亚洲欧美激情在线| 久久久久久久久久久久大奶| 老司机亚洲免费影院| 长腿黑丝高跟| 久久影院123| 日韩成人在线观看一区二区三区| 日本一区二区免费在线视频| 久久婷婷成人综合色麻豆| 亚洲黑人精品在线| 欧美国产精品va在线观看不卡| 成年人免费黄色播放视频| 亚洲国产中文字幕在线视频| 亚洲第一av免费看| 免费在线观看亚洲国产| 久久久久久人人人人人| 一个人观看的视频www高清免费观看 | 99国产综合亚洲精品| 如日韩欧美国产精品一区二区三区| 亚洲精品国产色婷婷电影| 欧美精品啪啪一区二区三区| 又大又爽又粗| 天堂动漫精品| 琪琪午夜伦伦电影理论片6080| 午夜福利在线免费观看网站| 亚洲熟妇中文字幕五十中出 | 日本免费a在线| 亚洲一区中文字幕在线| 美女国产高潮福利片在线看| 亚洲欧美日韩另类电影网站| 不卡一级毛片| 妹子高潮喷水视频| 又黄又爽又免费观看的视频| 丰满饥渴人妻一区二区三| 一边摸一边做爽爽视频免费| 久久久久亚洲av毛片大全| 亚洲专区国产一区二区| 高清在线国产一区| 亚洲成国产人片在线观看| 大香蕉久久成人网| 一个人观看的视频www高清免费观看 | 精品无人区乱码1区二区| 操出白浆在线播放| 性欧美人与动物交配| 人人妻人人添人人爽欧美一区卜| 中文字幕最新亚洲高清| 看黄色毛片网站| 精品少妇一区二区三区视频日本电影| 一二三四在线观看免费中文在| 国产高清视频在线播放一区| 村上凉子中文字幕在线| 99精品欧美一区二区三区四区| 国产精品久久久久久人妻精品电影| 别揉我奶头~嗯~啊~动态视频| 人妻久久中文字幕网| 人人妻人人添人人爽欧美一区卜| 看黄色毛片网站| 一级黄色大片毛片| 男人舔女人的私密视频| 久久人人精品亚洲av| 长腿黑丝高跟| 欧美在线一区亚洲| 午夜精品在线福利| 国产av又大| 国产成人啪精品午夜网站| 亚洲免费av在线视频| 欧美久久黑人一区二区| 久久久久国产精品人妻aⅴ院| 黑人巨大精品欧美一区二区蜜桃| 啦啦啦免费观看视频1| 国产精品一区二区三区四区久久 | 久久香蕉国产精品| 亚洲熟妇熟女久久| 狠狠狠狠99中文字幕| 无限看片的www在线观看| xxx96com| 午夜免费鲁丝| 两个人看的免费小视频| 黄色a级毛片大全视频| 亚洲午夜理论影院| 久久精品亚洲精品国产色婷小说| 一级a爱视频在线免费观看| 在线观看www视频免费| 成人av一区二区三区在线看| 国产在线观看jvid| 国产免费av片在线观看野外av| 91麻豆精品激情在线观看国产 | 狂野欧美激情性xxxx| 黄片播放在线免费| 变态另类成人亚洲欧美熟女 | 夜夜看夜夜爽夜夜摸 | 黄色视频不卡| 性色av乱码一区二区三区2| 国产国语露脸激情在线看| 黄色怎么调成土黄色| 夜夜看夜夜爽夜夜摸 | ponron亚洲| 丁香欧美五月| 少妇被粗大的猛进出69影院| 免费观看人在逋| 亚洲精华国产精华精| 一区在线观看完整版| 精品午夜福利视频在线观看一区| 国产激情欧美一区二区| 久久香蕉精品热| 亚洲片人在线观看| 久久久精品欧美日韩精品| 欧美乱妇无乱码| 亚洲成a人片在线一区二区| 黑人猛操日本美女一级片| 国产人伦9x9x在线观看| 一本综合久久免费| 亚洲精品在线美女| 国产真人三级小视频在线观看| 国产真人三级小视频在线观看| 人成视频在线观看免费观看| 国产亚洲欧美精品永久| 9热在线视频观看99| 精品国产一区二区三区四区第35| 久久中文字幕人妻熟女| 亚洲人成伊人成综合网2020| 欧美丝袜亚洲另类 | 色综合欧美亚洲国产小说| 欧美另类亚洲清纯唯美| 免费观看精品视频网站| 亚洲专区国产一区二区| 成人av一区二区三区在线看| 宅男免费午夜| 国产成人精品无人区| 国产国语露脸激情在线看| 人妻久久中文字幕网| 咕卡用的链子| www.自偷自拍.com| 国产黄a三级三级三级人| 久久精品91无色码中文字幕| 美女扒开内裤让男人捅视频| 人人妻人人添人人爽欧美一区卜| 少妇 在线观看| 身体一侧抽搐| 新久久久久国产一级毛片| 国产一区二区激情短视频| 91国产中文字幕| 欧美成人免费av一区二区三区| 在线观看免费高清a一片| 一进一出抽搐gif免费好疼 | 大香蕉久久成人网| 高清av免费在线| 欧美大码av| 香蕉久久夜色| 嫩草影视91久久| 琪琪午夜伦伦电影理论片6080| 在线观看午夜福利视频| 婷婷丁香在线五月| 91九色精品人成在线观看| 涩涩av久久男人的天堂| 久久精品人人爽人人爽视色| 一进一出抽搐动态| 两个人看的免费小视频| 妹子高潮喷水视频| 99精品欧美一区二区三区四区| www.www免费av| 国产精品美女特级片免费视频播放器 | 巨乳人妻的诱惑在线观看| 国产精品爽爽va在线观看网站 | 老司机靠b影院| av欧美777| 亚洲五月天丁香| av国产精品久久久久影院| 国产深夜福利视频在线观看| 99精国产麻豆久久婷婷| 99精品久久久久人妻精品| 一级毛片精品| 满18在线观看网站| 国产成人av教育| 国产1区2区3区精品| 国产精品综合久久久久久久免费 | 久久中文字幕人妻熟女| 99精品久久久久人妻精品| 国产99久久九九免费精品| 超碰97精品在线观看| 99国产精品免费福利视频| 青草久久国产| 窝窝影院91人妻| 亚洲av成人不卡在线观看播放网| 亚洲七黄色美女视频| 亚洲精品国产色婷婷电影| 国产一区二区三区视频了| av超薄肉色丝袜交足视频| 精品久久久精品久久久| av有码第一页| 久久热在线av| 国产欧美日韩精品亚洲av| 黄色丝袜av网址大全| 亚洲国产精品999在线| 日韩有码中文字幕| 最好的美女福利视频网| 美女 人体艺术 gogo| 色哟哟哟哟哟哟| av福利片在线| 亚洲精品国产区一区二| 一边摸一边抽搐一进一小说| 激情在线观看视频在线高清| 国产精品久久视频播放| 亚洲精品一卡2卡三卡4卡5卡| 国产伦人伦偷精品视频| 免费在线观看日本一区| 欧美日韩中文字幕国产精品一区二区三区 | 国产免费现黄频在线看| av国产精品久久久久影院| av视频免费观看在线观看| 午夜91福利影院| 18禁国产床啪视频网站| 一级片'在线观看视频| 国产蜜桃级精品一区二区三区| 老司机午夜福利在线观看视频| 91字幕亚洲| 母亲3免费完整高清在线观看| 黄网站色视频无遮挡免费观看| 大型av网站在线播放| 无限看片的www在线观看| 日韩视频一区二区在线观看| 日韩国内少妇激情av| 亚洲性夜色夜夜综合| 一级毛片精品| 久久久水蜜桃国产精品网| 制服人妻中文乱码| 黄色女人牲交| 日本三级黄在线观看| 国产在线观看jvid| 天堂影院成人在线观看| 一区二区日韩欧美中文字幕| 亚洲avbb在线观看| 欧美黄色片欧美黄色片| 两个人看的免费小视频| 久久狼人影院| 久久人人爽av亚洲精品天堂| 欧美黄色片欧美黄色片| 精品国产国语对白av| 日韩视频一区二区在线观看| 丝袜美足系列| 在线免费观看的www视频| 丰满迷人的少妇在线观看| 国产高清激情床上av| 亚洲情色 制服丝袜| a级片在线免费高清观看视频| 成人亚洲精品av一区二区 | 免费在线观看黄色视频的| 国产深夜福利视频在线观看| 人人妻人人澡人人看| 欧美日韩瑟瑟在线播放| 亚洲五月婷婷丁香| 亚洲自偷自拍图片 自拍| 国产午夜精品久久久久久| 久久青草综合色| 国产真人三级小视频在线观看| 欧美一级毛片孕妇| 欧美一区二区精品小视频在线| 久久香蕉激情| 丰满饥渴人妻一区二区三| 高清毛片免费观看视频网站 | 香蕉久久夜色| 婷婷六月久久综合丁香| aaaaa片日本免费| 婷婷精品国产亚洲av在线| 成人手机av| 手机成人av网站| 久久人妻熟女aⅴ| 国产成人精品久久二区二区免费| 亚洲国产精品sss在线观看 | 三级毛片av免费| www日本在线高清视频| 国产亚洲欧美在线一区二区| 国产成人啪精品午夜网站| 国产深夜福利视频在线观看| av网站免费在线观看视频| 午夜免费鲁丝| 欧美黑人欧美精品刺激| 91九色精品人成在线观看| 免费观看人在逋| 成人特级黄色片久久久久久久| 欧美成狂野欧美在线观看| 久久国产乱子伦精品免费另类| 性欧美人与动物交配| 黄片小视频在线播放| 亚洲在线自拍视频| 人人妻人人爽人人添夜夜欢视频| 高潮久久久久久久久久久不卡| 精品一品国产午夜福利视频| 正在播放国产对白刺激| 久久人人精品亚洲av| 久久精品国产99精品国产亚洲性色 | 美女福利国产在线| 一个人免费在线观看的高清视频| 国产精品98久久久久久宅男小说| 1024视频免费在线观看| 午夜免费成人在线视频| 婷婷丁香在线五月| 亚洲熟妇熟女久久| 在线观看免费高清a一片| 90打野战视频偷拍视频| 精品福利观看| 丝袜人妻中文字幕| 黑人巨大精品欧美一区二区蜜桃| 国产精品亚洲av一区麻豆| 国产91精品成人一区二区三区| 国产成人一区二区三区免费视频网站| 久久精品国产亚洲av香蕉五月| 国产精品一区二区在线不卡| 欧美激情高清一区二区三区| 欧美乱色亚洲激情| 后天国语完整版免费观看| 欧美一区二区精品小视频在线| 国产精品久久电影中文字幕| 80岁老熟妇乱子伦牲交| 精品卡一卡二卡四卡免费| 俄罗斯特黄特色一大片| 老司机在亚洲福利影院| 成人手机av| 啦啦啦免费观看视频1| xxxhd国产人妻xxx| 午夜福利在线免费观看网站| 黄网站色视频无遮挡免费观看| av片东京热男人的天堂| 国产不卡一卡二| 真人做人爱边吃奶动态| 午夜亚洲福利在线播放| 在线观看免费视频日本深夜| tocl精华| 午夜91福利影院| 桃红色精品国产亚洲av| 村上凉子中文字幕在线| 午夜久久久在线观看| 亚洲人成77777在线视频| 热99国产精品久久久久久7| cao死你这个sao货| 999久久久国产精品视频| 亚洲免费av在线视频| 男女下面进入的视频免费午夜 | 精品乱码久久久久久99久播| 久久国产精品人妻蜜桃| а√天堂www在线а√下载| 黑人巨大精品欧美一区二区mp4| 无人区码免费观看不卡| 亚洲精品在线观看二区| 亚洲avbb在线观看| 日韩欧美一区二区三区在线观看| 夜夜躁狠狠躁天天躁| 成人免费观看视频高清| 又紧又爽又黄一区二区| 香蕉国产在线看| 老熟妇仑乱视频hdxx| 多毛熟女@视频| 亚洲成人国产一区在线观看| 色婷婷久久久亚洲欧美| 夜夜爽天天搞| 热re99久久精品国产66热6| 可以免费在线观看a视频的电影网站| 国产一卡二卡三卡精品| 精品一区二区三区av网在线观看| 亚洲七黄色美女视频| 一级黄色大片毛片| 久久性视频一级片| 啦啦啦免费观看视频1| 多毛熟女@视频| 中文字幕人妻丝袜一区二区| 岛国在线观看网站| 午夜福利在线观看吧| 中文亚洲av片在线观看爽| www国产在线视频色| 两个人免费观看高清视频| 国产精品一区二区在线不卡| 高清黄色对白视频在线免费看| 亚洲成人免费电影在线观看| 亚洲第一欧美日韩一区二区三区|