Research Article

VulDistilBERT: A CPS Vulnerability Severity Prediction Method Based on Distillation Model

Table 1

Description and possible values for base metric group of CVSS. The metric names in this table will be referred to by abbreviations and ID number in [11].

IDMetricDescriptionPossible values

0Attack vector (AV)This metric represents the conditions under which exploiting vulnerability is conceivable. The farther an attacker may exploit a susceptible component, the higher this metricPhysical
Network
Local
Adjacent

1Attack complexity (AC)This metric reflects the attacker-uncontrolled circumstances needed to exploit the vulnerabilityLow
High

2Privileges required (PR)This metric represents an attacker’s privilege before exploitation. The score is the highest when no privileges are necessaryNone
Low
High

3User interaction (UI)This metric represents the necessity for a human user other than the attacker to be involved in the successful penetration of the susceptible componentRequired
None

4Scope (S)This metric measures whether one component’s vulnerability impacts other components’ resourcesUnchanged
Changed

5Confidentiality (C)This metric quantifies the confidentiality of a successfully exploited vulnerability on the component most directly and predictably affected by the attackNone
Low
High

6Integrity (I)This metric represents vulnerability’s influence on integrity. Integrity means truthfulness and trustworthinessNone
Low
High

7Availability (A)This metric assesses a vulnerability’s influence on a component’s availabilityNone
Low
High