Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Towards Automated Assessment of Vulnerability Exposures in Security Operations

Conference ·

Current approaches for risk analysis of software vulnerabilities using manual assessment and numeric scoring do not complete fast enough to keep pace with the maintenance work rate to patch and mitigate the vulnerabilities. This paper proposes a new approach to modeling software vulnerability risk in the context of the network environment and firewall configuration. In the approach, vulnerability features are automatically matched up with networking, target asset, and adversary features to determine whether adversaries can exploit a vulnerability. The ability of adversaries to reach a vulnerability is modeled by automatically identifying the network services associated with vulnerabilities through a pipeline of machine learning and natural language processing and automatically analyzing network reachability. Our results show that the pipeline can identify network services accurately. We also find that only a small number of vulnerabilities pose real risks to a system. However, if left unmitigated, adversarial reach to vulnerabilities may extend to nullify the effect of firewall countermeasures.

Research Organization:
University of Arkansas
Sponsoring Organization:
Department of Energy
DOE Contract Number:
CR0000003
OSTI ID:
2584209
Country of Publication:
United States
Language:
English

Similar Records

V-INT: Automated Vulnerability Intelligence and Risk Assessment
Technical Report · Mon Jul 21 00:00:00 EDT 2025 · OSTI ID:2584203

Improving Cyber Situational Understanding
Thesis/Dissertation · Wed Aug 20 00:00:00 EDT 2025 · OSTI ID:2584218

Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis
Conference · Wed Jan 17 23:00:00 EST 2018 · OSTI ID:1434513

Related Subjects