Vulnerability Selection for Remediation: An Empirical Analysis

9Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

Your institution provides access to this article.

Abstract

Vulnerabilities are security flaws in software and network systems that criminal hackers can exploit to gain an asymmetric advantage. Cyber-Security Operations Centers must routinely triage and patch vulnerabilities in their system(s) to minimize external exposure to attackers. The personnel resources required to address vulnerability remediation tasks are limited and constrained, thus motivating the need for optimization approaches to improve the efficiency of the vulnerability selection process. This paper investigates two different approaches to vulnerability selection for mitigation through (a) Individual Attribute Value Optimization and (b) Multiple Attribute Value Optimization. The former approach presents a methodology that optimizes the selection of vulnerabilities for mitigation with respect to an individual attribute, while the latter approach considers multiple attributes in the vulnerability selection decision-making. Real scan data from a Cyber-Security Operations Center are used to compare the results between the two mathematical approaches. Furthermore, comparisons are made with the results obtained from (a) the actual (baseline) Cyber-Security Operations Center performance, and (b) a vulnerability prioritization algorithm called VULCON that appeared in recent literature.

References Powered by Scopus

213Citations
570Readers

This article is free to access.

138Citations
110Readers
Get full text
Get full text

Cited by Powered by Scopus

5Citations
39Readers
Get full text

Automated Patch Management: An Empirical Evaluation Study

2Citations
8Readers
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Shah, A., Farris, K. A., Ganesan, R., & Jajodia, S. (2022). Vulnerability Selection for Remediation: An Empirical Analysis. Journal of Defense Modeling and Simulation, 19(1), 13–22. https://doi.org/10.1177/1548512919874129

Readers over time

‘19‘20‘21‘22‘23‘24‘250481216

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

100%

Readers' Discipline

Tooltip

Computer Science 5

83%

Engineering 1

17%

Save time finding and organizing research with Mendeley

Sign up for free
0