Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Automated Context-Aware Vulnerability Risk Management for Patch Prioritization
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0002-0128-4127
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0003-4494-9851
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0002-3118-5058
2022 (English)In: Electronics, E-ISSN 2079-9292, Vol. 11, no 21, article id 3580Article in journal (Refereed) Published
Abstract [en]

The information-security landscape continuously evolves by discovering new vulnerabilities daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most crucial cyber defense to eliminate attack surfaces in IT environments. VRM is a cyclical practice of identifying, classifying, evaluating, and remediating vulnerabilities. The evaluation stage of VRM is neither automated nor cost-effective, as it demands great manual administrative efforts to prioritize the patch. Therefore, there is an urgent need to improve the VRM procedure by automating the entire VRM cycle in the context of a given organization. The authors propose automated context-aware VRM (ACVRM), to address the above challenges. This study defines the criteria to consider in the evaluation stage of ACVRM to prioritize the patching. Moreover, patch prioritization is customized in an organization’s context by allowing the organization to select the vulnerability management mode and weigh the selected criteria. Specifically, this study considers four vulnerability evaluation cases: (i) evaluation criteria are weighted homogeneously; (ii) attack complexity and availability are not considered important criteria; (iii) the security score is the only important criteria considered; and (iv) criteria are weighted based on the organization’s risk appetite. The result verifies the proposed solution’s efficiency compared with the Rudder vulnerability management tool (CVE-plugin). While Rudder produces a ranking independent from the scenario, ACVRM can sort vulnerabilities according to the organization’s criteria and context. Moreover, while Rudder randomly sorts vulnerabilities with the same patch score, ACVRM sorts them according to their age, giving a higher security score to older publicly known vulnerabilities. © 2022 by the authors.

Place, publisher, year, edition, pages
MDPI, 2022. Vol. 11, no 21, article id 3580
Keywords [en]
patch prioritization, risk management, security management, vulnerability management
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:bth-23982DOI: 10.3390/electronics11213580ISI: 000883429300001Scopus ID: 2-s2.0-85141721682OAI: oai:DiVA.org:bth-23982DiVA, id: diva2:1713341
Note

open access

Available from: 2022-11-24 Created: 2022-11-24 Last updated: 2025-09-30Bibliographically approved
In thesis
1. Towards Automated Context-aware Vulnerability Risk Management
Open this publication in new window or tab >>Towards Automated Context-aware Vulnerability Risk Management
2023 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. Vulnerability Risk Management (VRM) is an essential cyber defense mechanism to eliminate or reduce attack surfaces in information technology. VRM is a continuous procedure of identification, classification, evaluation, and remediation of vulnerabilities. The traditional VRM procedure is time-consuming as classification, evaluation, and remediation require skills and knowledge of specific computer systems, software, network, and security policies. Activities requiring human input slow down the VRM process, increasing the risk of exploiting a vulnerability.

The thesis introduces the Automated Context-aware Vulnerability Risk Management (ACVRM) methodology to improve VRM procedures by automating the entire VRM cycle and reducing the procedure time and experts' intervention. ACVRM focuses on the challenging stages (i.e., classification, evaluation, and remediation) of VRM to support security experts in promptly prioritizing and patching the vulnerabilities. 

ACVRM concept is designed and implemented in a test environment for proof of concept. The efficiency of patch prioritization by ACVRM compared against a commercial vulnerability management tool (i.e., Rudder). ACVRM prioritized the vulnerability based on the patch score (i.e., the numeric representation of the vulnerability characteristic and the risk), the historical data, and dependencies. The experiments indicate that ACVRM could rank the vulnerabilities in the organization's context by weighting the criteria used in patch score calculation. The automated patch deployment is implemented with three use cases to investigate the impact of learning from historical events and dependencies on the success rate of the patch and human intervention. Our finding shows that ACVRM reduced the need for human actions, increased the ratio of successfully patched vulnerabilities, and decreased the cycle time of VRM process.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2023. p. 136
Series
Blekinge Institute of Technology Doctoral Dissertation Series, ISSN 1653-2090 ; 2023:07
Keywords
Vulnerability Risk Management, VRM, Automated Context-Aware Vulnerability Risk Management, ACVRM, Information security
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-24468 (URN)978-91-7295-459-5 (ISBN)
Public defence
2023-06-15, J1630 + Zoom, CAMPUS GRASVIK, KARLSKRONA, 13:00 (English)
Opponent
Supervisors
Note

In reference to IEEE copyrighted material which is used with permission in this thesis, the IEEE does not endorse any of BTH's products or services. Internal or personal use of this material is permitted. If interested in reprinting/republishing IEEE copyrighted material for advertising or promotional purposes or for creating new collective works for resale or redistribution, please go to http://www.ieee.org/publications_standards/publications/rights/rights_link.html to learn how to obtain a License from RightsLink. If applicable, University Microfilms and/or ProQuest Library, or the Archives of Canada may supply single copies of the dissertation.

Available from: 2023-04-25 Created: 2023-04-24 Last updated: 2025-09-30Bibliographically approved

Open Access in DiVA

fulltext(655 kB)446 downloads
File information
File name FULLTEXT01.pdfFile size 655 kBChecksum SHA-512
c759d50ab6e2057ce2a353aaf5371c4d0f45fc99982e4b144490c55789c408f7f7ee87bf39b785b3e1b2e1cfd1507a7fd608cb36cf414583e1453fb12358bfd4
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Ahmadi Mehri, VidaArlos, PatrikCasalicchio, Emiliano

Search in DiVA

By author/editor
Ahmadi Mehri, VidaArlos, PatrikCasalicchio, Emiliano
By organisation
Department of Computer Science
In the same journal
Electronics
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 446 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 976 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf