Risk-ranking matrix for security patching of exploitable vulnerabilities
A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker to manipulate the system in some way. Since the late 1980s cyberattacks through ex...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
American Institute of Physics Inc.
2024
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-34231 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-342312024-10-14T11:18:33Z Risk-ranking matrix for security patching of exploitable vulnerabilities Hoque M.S. Jamil N. Amin N. Mansor M. 57220806665 36682671900 7102424614 6701749037 A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker to manipulate the system in some way. Since the late 1980s cyberattacks through exploiting vulnerabilities started to evolve and increasingly becoming sophisticated and dangerous. Successful cyber-attacks are primarily takes place through the exploitation of vulnerabilities. Although thousands of vulnerabilities are being detected and registered each year it has been observed that only few of them get exploited by threat actors. Hence, there is a need to utilize machine learning to develop a model to predict the highly exploitable vulnerabilities by the threat actors and a model to predict the number of future vulnerability to support a cost-effective cyber security management. Subsequently, the predicted exploitable vulnerabilities need to be ranked to understand their severity impact, if the exploitation is realized. The literature reviews show that all the existing machine learning models primarily have utilized United States (U.S) vulnerability database, the largest in its kind, as the source of vulnerability data. The literature review shows that there are existing research works with machine learning approaches to forecast the number of future vulnerabilities and to predict the highly exploitable vulnerabilities, but the literature shows that a risk ranking matrix is missing in this domain. Hence, the need to fill up this gap is of urgent need. The aim of this research is to develop a novel risk matrix that ranks the severity impact of highly exploitable vulnerabilities. To achieve this scope we have developed machine learning based model to predict the highly exploitable vulnerabilities to work as background engines to find the most exploitable vulnerabilities out of published known vulnerabilities. Unlike few existing research works, our proposed risk ranking matrix for most exploitable vulnerabilities aggregated all the relevant attributes for base CVSS scoring and the CVSS score itself, the proposed algorithm has ten risk levels which are highly granular and flexible. Furthermore, those risk levels can be redefined and scaled to meet any specific security needs. Finally, a proof of concept tool is also developed to demonstrate the proposed vulnerability prediction framework. The proposed risk ranking matrix can significantly support the security patching management in a proactive and cost-effective way. Moreover, the proposed models need much less computational resources and time, making it suitable for the usage of any scale. � 2023 Author(s). Final 2024-10-14T03:18:32Z 2024-10-14T03:18:32Z 2023 Conference Paper 10.1063/5.0134560 2-s2.0-85161482298 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85161482298&doi=10.1063%2f5.0134560&partnerID=40&md5=dd6dc5b5bdc216618c5ee8137b3c41bf https://irepository.uniten.edu.my/handle/123456789/34231 2808 50004 American Institute of Physics Inc. Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker to manipulate the system in some way. Since the late 1980s cyberattacks through exploiting vulnerabilities started to evolve and increasingly becoming sophisticated and dangerous. Successful cyber-attacks are primarily takes place through the exploitation of vulnerabilities. Although thousands of vulnerabilities are being detected and registered each year it has been observed that only few of them get exploited by threat actors. Hence, there is a need to utilize machine learning to develop a model to predict the highly exploitable vulnerabilities by the threat actors and a model to predict the number of future vulnerability to support a cost-effective cyber security management. Subsequently, the predicted exploitable vulnerabilities need to be ranked to understand their severity impact, if the exploitation is realized. The literature reviews show that all the existing machine learning models primarily have utilized United States (U.S) vulnerability database, the largest in its kind, as the source of vulnerability data. The literature review shows that there are existing research works with machine learning approaches to forecast the number of future vulnerabilities and to predict the highly exploitable vulnerabilities, but the literature shows that a risk ranking matrix is missing in this domain. Hence, the need to fill up this gap is of urgent need. The aim of this research is to develop a novel risk matrix that ranks the severity impact of highly exploitable vulnerabilities. To achieve this scope we have developed machine learning based model to predict the highly exploitable vulnerabilities to work as background engines to find the most exploitable vulnerabilities out of published known vulnerabilities. Unlike few existing research works, our proposed risk ranking matrix for most exploitable vulnerabilities aggregated all the relevant attributes for base CVSS scoring and the CVSS score itself, the proposed algorithm has ten risk levels which are highly granular and flexible. Furthermore, those risk levels can be redefined and scaled to meet any specific security needs. Finally, a proof of concept tool is also developed to demonstrate the proposed vulnerability prediction framework. The proposed risk ranking matrix can significantly support the security patching management in a proactive and cost-effective way. Moreover, the proposed models need much less computational resources and time, making it suitable for the usage of any scale. � 2023 Author(s). |
author2 |
57220806665 |
author_facet |
57220806665 Hoque M.S. Jamil N. Amin N. Mansor M. |
format |
Conference Paper |
author |
Hoque M.S. Jamil N. Amin N. Mansor M. |
spellingShingle |
Hoque M.S. Jamil N. Amin N. Mansor M. Risk-ranking matrix for security patching of exploitable vulnerabilities |
author_sort |
Hoque M.S. |
title |
Risk-ranking matrix for security patching of exploitable vulnerabilities |
title_short |
Risk-ranking matrix for security patching of exploitable vulnerabilities |
title_full |
Risk-ranking matrix for security patching of exploitable vulnerabilities |
title_fullStr |
Risk-ranking matrix for security patching of exploitable vulnerabilities |
title_full_unstemmed |
Risk-ranking matrix for security patching of exploitable vulnerabilities |
title_sort |
risk-ranking matrix for security patching of exploitable vulnerabilities |
publisher |
American Institute of Physics Inc. |
publishDate |
2024 |
_version_ |
1814061110512320512 |
score |
13.214268 |