A MULTI-LAYER TREE MODEL FOR ENTERPRISE VULNERABILITY MANAGEMENT

被引:0
|
作者
Wu, Bin [1 ]
Wang, Andy Ju An [1 ]
机构
[1] Southern Polytech State Univ, Marietta, GA 30060 USA
基金
美国国家科学基金会;
关键词
Enterprise vulnerability; Multi-level tree model; Assessment; EVMAT; NVD;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conducting enterprise-wide vulnerability assessment (VA) on a regular basis plays an important role in assessing an enterprise's information system security status. However, an enterprise network is always very complex, separated into different types of zones, and consisting hundreds of hosts in the networks. The complexity of IT system makes VA an extremely time-consuming task for security professionals. They are seeking for an automated tool that helps monitor and manage the overall vulnerability of an enterprise. This paper presents a novel methodology that provides a dashboard solution for managing enterprise level vulnerability. In our methodology, we develop a multi-layer tree based model to describe enterprise vulnerability topology. Then we apply a client/server structure to gather vulnerability information from enterprise resources automatically. Finally a set of well-defined metric formulas is applied to produce a normalized vulnerability score for the whole enterprise. We also developed the implementation of our methodology, EVMAT, and Enterprise Vulnerability Management and Assessment Tool, to test our method. Experiments on a small E-commerce company and a small IT company demonstrate the great potentials of our tool for enterprise-level security.
引用
收藏
页码:389 / 394
页数:6
相关论文
共 50 条
  • [1] A multi-layer framework for enterprise application development
    Manhaes, Rodrigo Soares
    Gomes da Silva, Alexandre
    Batista de Almeida, Luiz
    Atem de Carvalho, Rogdrio
    Research and Practical Issues of Enterprise Information Systems, 2006, : 285 - 296
  • [2] Multi-layer control management
    Grammel, G
    Belotti, S
    Luchesini, L
    Papadimitriou, D
    ALCATEL TELECOMMUNICATIONS REVIEW, 2005, (03): : 227 - 231
  • [3] The Vulnerability Analysis of the Multi-layer Air Transport System
    Zhao, Mo
    Wang, Xinglong
    Pan, Weihuang
    Mang, Xingjian
    2019 5TH INTERNATIONAL CONFERENCE ON TRANSPORTATION INFORMATION AND SAFETY (ICTIS 2019), 2019, : 956 - 962
  • [4] VulTR: Software vulnerability detection model based on multi-layer key feature enhancement
    He, Haitao
    Wang, Sheng
    Wang, Yanmin
    Liu, Ke
    Yu, Lu
    COMPUTERS & SECURITY, 2025, 148
  • [5] The multi-layer VPN management architecture
    Kim, EC
    Hong, CS
    Song, JG
    INTEGRATED NETWORK MANAGEMENT VI: DISTRIBUTED MANAGEMENT FOR THE NETWORKED MILLENNIUM, 1999, : 187 - 200
  • [6] A multi-layer model for resource management architecture in spatial information grid
    Yu, Dandan
    He, Yanxiang
    Tu, Guoqing
    Liu, Maofu
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (21): : 40 - 42
  • [7] Multi-layer Process Management Model in Collaborative Product Development Environment
    Li, Y. M.
    Ding, T.
    He, Q. D.
    INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY (AMEIT 2015), 2015, : 49 - 54
  • [8] The effusivity model for multi-layer walls
    Hassid, Samuel
    International Journal of Solar Energy, 2002, 22 (01) : 1 - 8
  • [9] A multi-layer model for early diagenesis
    MEI HongmingDepartment of Marine Geology
    ChineseScienceBulletin, 1997, (16) : 1385 - 1387
  • [10] A multi-layer model for early diagenesis
    Mei, HM
    CHINESE SCIENCE BULLETIN, 1997, 42 (16): : 1385 - 1387