Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Automated Context-Aware Vulnerability Risk Management for Patch Prioritization
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.ORCID-id: 0000-0002-0128-4127
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.ORCID-id: 0000-0003-4494-9851
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.ORCID-id: 0000-0002-3118-5058
2022 (engelsk)Inngår i: Electronics, E-ISSN 2079-9292, Vol. 11, nr 21, artikkel-id 3580Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The information-security landscape continuously evolves by discovering new vulnerabilities daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most crucial cyber defense to eliminate attack surfaces in IT environments. VRM is a cyclical practice of identifying, classifying, evaluating, and remediating vulnerabilities. The evaluation stage of VRM is neither automated nor cost-effective, as it demands great manual administrative efforts to prioritize the patch. Therefore, there is an urgent need to improve the VRM procedure by automating the entire VRM cycle in the context of a given organization. The authors propose automated context-aware VRM (ACVRM), to address the above challenges. This study defines the criteria to consider in the evaluation stage of ACVRM to prioritize the patching. Moreover, patch prioritization is customized in an organization’s context by allowing the organization to select the vulnerability management mode and weigh the selected criteria. Specifically, this study considers four vulnerability evaluation cases: (i) evaluation criteria are weighted homogeneously; (ii) attack complexity and availability are not considered important criteria; (iii) the security score is the only important criteria considered; and (iv) criteria are weighted based on the organization’s risk appetite. The result verifies the proposed solution’s efficiency compared with the Rudder vulnerability management tool (CVE-plugin). While Rudder produces a ranking independent from the scenario, ACVRM can sort vulnerabilities according to the organization’s criteria and context. Moreover, while Rudder randomly sorts vulnerabilities with the same patch score, ACVRM sorts them according to their age, giving a higher security score to older publicly known vulnerabilities. © 2022 by the authors.

sted, utgiver, år, opplag, sider
MDPI, 2022. Vol. 11, nr 21, artikkel-id 3580
Emneord [en]
patch prioritization, risk management, security management, vulnerability management
HSV kategori
Identifikatorer
URN: urn:nbn:se:bth-23982DOI: 10.3390/electronics11213580ISI: 000883429300001Scopus ID: 2-s2.0-85141721682OAI: oai:DiVA.org:bth-23982DiVA, id: diva2:1713341
Merknad

open access

Tilgjengelig fra: 2022-11-24 Laget: 2022-11-24 Sist oppdatert: 2025-09-30bibliografisk kontrollert
Inngår i avhandling
1. Towards Automated Context-aware Vulnerability Risk Management
Åpne denne publikasjonen i ny fane eller vindu >>Towards Automated Context-aware Vulnerability Risk Management
2023 (engelsk)Doktoravhandling, med artikler (Annet vitenskapelig)
Abstract [en]

The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. Vulnerability Risk Management (VRM) is an essential cyber defense mechanism to eliminate or reduce attack surfaces in information technology. VRM is a continuous procedure of identification, classification, evaluation, and remediation of vulnerabilities. The traditional VRM procedure is time-consuming as classification, evaluation, and remediation require skills and knowledge of specific computer systems, software, network, and security policies. Activities requiring human input slow down the VRM process, increasing the risk of exploiting a vulnerability.

The thesis introduces the Automated Context-aware Vulnerability Risk Management (ACVRM) methodology to improve VRM procedures by automating the entire VRM cycle and reducing the procedure time and experts' intervention. ACVRM focuses on the challenging stages (i.e., classification, evaluation, and remediation) of VRM to support security experts in promptly prioritizing and patching the vulnerabilities. 

ACVRM concept is designed and implemented in a test environment for proof of concept. The efficiency of patch prioritization by ACVRM compared against a commercial vulnerability management tool (i.e., Rudder). ACVRM prioritized the vulnerability based on the patch score (i.e., the numeric representation of the vulnerability characteristic and the risk), the historical data, and dependencies. The experiments indicate that ACVRM could rank the vulnerabilities in the organization's context by weighting the criteria used in patch score calculation. The automated patch deployment is implemented with three use cases to investigate the impact of learning from historical events and dependencies on the success rate of the patch and human intervention. Our finding shows that ACVRM reduced the need for human actions, increased the ratio of successfully patched vulnerabilities, and decreased the cycle time of VRM process.

sted, utgiver, år, opplag, sider
Karlskrona: Blekinge Tekniska Högskola, 2023. s. 136
Serie
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 2023:07
Emneord
Vulnerability Risk Management, VRM, Automated Context-Aware Vulnerability Risk Management, ACVRM, Information security
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:bth-24468 (URN)978-91-7295-459-5 (ISBN)
Disputas
2023-06-15, J1630 + Zoom, CAMPUS GRASVIK, KARLSKRONA, 13:00 (engelsk)
Opponent
Veileder
Merknad

In reference to IEEE copyrighted material which is used with permission in this thesis, the IEEE does not endorse any of BTH's products or services. Internal or personal use of this material is permitted. If interested in reprinting/republishing IEEE copyrighted material for advertising or promotional purposes or for creating new collective works for resale or redistribution, please go to http://www.ieee.org/publications_standards/publications/rights/rights_link.html to learn how to obtain a License from RightsLink. If applicable, University Microfilms and/or ProQuest Library, or the Archives of Canada may supply single copies of the dissertation.

Tilgjengelig fra: 2023-04-25 Laget: 2023-04-24 Sist oppdatert: 2025-09-30bibliografisk kontrollert

Open Access i DiVA

fulltext(655 kB)471 nedlastinger
Filinformasjon
Fil FULLTEXT01.pdfFilstørrelse 655 kBChecksum SHA-512
c759d50ab6e2057ce2a353aaf5371c4d0f45fc99982e4b144490c55789c408f7f7ee87bf39b785b3e1b2e1cfd1507a7fd608cb36cf414583e1453fb12358bfd4
Type fulltextMimetype application/pdf

Andre lenker

Forlagets fulltekstScopus

Person

Ahmadi Mehri, VidaArlos, PatrikCasalicchio, Emiliano

Søk i DiVA

Av forfatter/redaktør
Ahmadi Mehri, VidaArlos, PatrikCasalicchio, Emiliano
Av organisasjonen
I samme tidsskrift
Electronics

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 471 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 1054 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf