Towards Automated Assessment of Vulnerability Exposures in Security Operations
Current approaches for risk analysis of software vulnerabilities using manual assessment and numeric scoring do not complete fast enough to keep pace with the maintenance work rate to patch and mitigate the vulnerabilities. This paper proposes a new approach to modeling software vulnerability risk in the context of the network environment and firewall configuration. In the approach, vulnerability features are automatically matched up with networking, target asset, and adversary features to determine whether adversaries can exploit a vulnerability. The ability of adversaries to reach a vulnerability is modeled by automatically identifying the network services associated with vulnerabilities through a pipeline of machine learning and natural language processing and automatically analyzing network reachability. Our results show that the pipeline can identify network services accurately. We also find that only a small number of vulnerabilities pose real risks to a system. However, if left unmitigated, adversarial reach to vulnerabilities may extend to nullify the effect of firewall countermeasures.
- Research Organization:
- University of Arkansas
- Sponsoring Organization:
- Department of Energy
- DOE Contract Number:
- CR0000003
- OSTI ID:
- 2584209
- Country of Publication:
- United States
- Language:
- English
Similar Records
Improving Cyber Situational Understanding
Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis