skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: VULCON: A System for Vulnerability Prioritization, Mitigation, and Management

Journal Article · · ACM Transactions on Privacy and Security
DOI:https://doi.org/10.1145/3196884· OSTI ID:1470730

Vulnerability remediation is a critical task in operational software and network security management. In this paper, an effective vulnerability management strategy, called VULCON (VULnerability CONtrol), is developed and evaluated. The strategy is based on two fundamental performance metrics: i). Time-to-Vulnerability Remediation (TVR) and; ii). Total Vulnerability Exposure (TVE). VULCON takes as input real vulnerability scan reports, metadata about the discovered vulnerabilities, asset criticality, and personnel resources. VULCON uses a mixed integer multi-objective optimization algorithm to prioritize vulnerabilities for patching, such that the above performance metrics are optimized subject to the given resource constraints. VULCON has been tested on multiple months of real scan data from a Cyber-Security Operations Center (CSOC). Results indicate an overall Total Vulnerability Exposure reduction of 8.97\% when VULCON optimizes a realistic security analyst workforce's effort. Additionally, it is demonstrated that VULCON can determine monthly resources required to maintain a target TVE score. As such, VULCON provides valuable operational guidance for improving vulnerability response processes in CSOCs.

Research Organization:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC05-76RL01830
OSTI ID:
1470730
Report Number(s):
PNNL-SA-133665
Journal Information:
ACM Transactions on Privacy and Security, Vol. 21, Issue 4; ISSN 2471-2566
Country of Publication:
United States
Language:
English

References (12)

US Emergency Department Performance on Wait Time and Length of Visit journal February 2010
A new normalized goal programming model for multi-objective problems: A case of supplier selection and order allocation journal February 2014
On the complexity of integer programming journal October 1981
Lean Thinking in Emergency Departments: A Critical Review journal March 2011
Security Patch Management: Share the Burden or Share the Damage? journal April 2008
Financial portfolio management through the goal programming model: Current state-of-the-art journal April 2014
Generalized goal programming An overview journal January 1983
Control charting methods for autocorrelated cyber vulnerability data journal March 2016
Insurability of Cyber Risk: An Empirical Analysis journal June 2014
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks journal November 2012
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)
  • Dumitras, Tudor; Shou, Darren
  • Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS '11 https://doi.org/10.1145/1978672.1978683
conference January 2011
Emergency Department Operational Metrics, Measures and Definitions: Results of the Second Performance Measures and Benchmarking Summit journal July 2011

Related Subjects