REVS: A Vulnerability Ranking Tool for Enterprise Security

被引:0
|
作者
Forain, Igor [1 ]
Albuquerque, Robson de Oliveira [1 ]
de Sousa Junior, Rafael Timoteo [1 ]
机构
[1] Univ Brasilia UnB, Dept Elect Engn ENE, Profess Program Elect Engn PPEE, Brasilia, DF, Brazil
基金
欧盟地平线“2020”;
关键词
Cybersecurity; Vulnerabilities; Pentest; NVD; CNVD; TOPSIS;
D O I
10.5220/0011068600003179
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security incidents currently affect organizations worldwide. In 2021, thousands of companies suffered cyber attacks, resulting in billions of dollars in losses. Most of these events result from known vulnerabilities in information assets. However, several heterogeneous databases and sources host information about those flaws, turning the risk assessment difficult. This paper proposes a Recommender ExploitationVulnerability System (REVS) with the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) to rank vulnerability-exploit. The REVS is a dual tool that can pinpoint the best exploits to pentest or the most sensitive vulnerabilities to cybersecurity staff. This paper also presents results in the GNS3 emulator leveraging data from the National Vulnerability Database (NVD), the China National Vulnerability Database (CNVD), and Vulners. They reveal that the CNVD, despite data issues, has 23,281 vulnerabilities entries unmapped in the NVD. Moreover, this work establishes criteria to link heterogeneous vulnerability databases.
引用
收藏
页码:126 / 133
页数:8
相关论文
共 50 条
  • [1] The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures
    Sommestad, Teodor
    Ekstedt, Mathias
    Holm, Hannes
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 363 - 373
  • [2] Network Simulation and Vulnerability Assessment Tool for an Enterprise Network
    Dhivvya, J. P.
    Muralidharan, Divya
    Raj, Neha
    Kumar, Barnala Kiran
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [3] An Innovative Network Security Vulnerability Modeling Method and Tool
    Qiu, Xiangqun
    Paterson, Rob
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (01) : 104 - 108
  • [4] EVMAT: An OVAL and NVD Based Enterprise Vulnerability Modeling and Assessment Tool
    Wu, Bin
    Wang, Andy Ju An
    [J]. PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 115 - 120
  • [5] securiCAD by foreseeti A CAD tool for enterprise cyber security management
    Ekstedt, Mathias
    Johnson, Pontus
    Lagerstrom, Robert
    Gorton, Dan
    Nydren, Joakim
    Shahzad, Khurram
    [J]. PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2015), 2015, : 152 - 155
  • [6] Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking
    Tan, Xin
    Zhang, Yuan
    Mi, Chenyuan
    Cao, Jiajun
    Sun, Kun
    Lin, Yifan
    Yang, Min
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3282 - 3299
  • [7] ENTERPRISE INFORMATION PORTAL-A TOOL TO COMBAT INSIDER ACTIVITY IN AN ENTERPRISE'S ECONOMIC SECURITY SYSTEM
    Sorbat, I. V.
    Kavun, S. V.
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2012, 1 (12):
  • [8] A rule-based security auditing tool for software vulnerability detection
    Lee, Moohun
    Cho, Sunghoon
    Jang, Changbok
    Park, Heeyong
    Choi, Euiin
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 505 - 512
  • [9] Empirical studies on the impact of filter-based ranking feature selection on security vulnerability prediction
    Chen, Xiang
    Yuan, Zhidan
    Cui, Zhanqi
    Zhang, Dun
    Ju, Xiaolin
    [J]. IET SOFTWARE, 2021, 15 (01) : 75 - 89
  • [10] REVS: A Tool for Space-Optimized Reversible Circuit Synthesis
    Parent, Alex
    Roetteler, Martin
    Svore, Krysta M.
    [J]. REVERSIBLE COMPUTATION, RC 2017, 2017, 10301 : 90 - 101