Risk-ranking matrix for security patching of exploitable vulnerabilities

A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker to manipulate the system in some way. Since the late 1980s cyberattacks through ex...

Full description

Saved in:
Bibliographic Details
Main Authors: Hoque M.S., Jamil N., Amin N., Mansor M.
Other Authors: 57220806665
Format: Conference Paper
Published: American Institute of Physics Inc. 2024
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-34231
record_format dspace
spelling my.uniten.dspace-342312024-10-14T11:18:33Z Risk-ranking matrix for security patching of exploitable vulnerabilities Hoque M.S. Jamil N. Amin N. Mansor M. 57220806665 36682671900 7102424614 6701749037 A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker to manipulate the system in some way. Since the late 1980s cyberattacks through exploiting vulnerabilities started to evolve and increasingly becoming sophisticated and dangerous. Successful cyber-attacks are primarily takes place through the exploitation of vulnerabilities. Although thousands of vulnerabilities are being detected and registered each year it has been observed that only few of them get exploited by threat actors. Hence, there is a need to utilize machine learning to develop a model to predict the highly exploitable vulnerabilities by the threat actors and a model to predict the number of future vulnerability to support a cost-effective cyber security management. Subsequently, the predicted exploitable vulnerabilities need to be ranked to understand their severity impact, if the exploitation is realized. The literature reviews show that all the existing machine learning models primarily have utilized United States (U.S) vulnerability database, the largest in its kind, as the source of vulnerability data. The literature review shows that there are existing research works with machine learning approaches to forecast the number of future vulnerabilities and to predict the highly exploitable vulnerabilities, but the literature shows that a risk ranking matrix is missing in this domain. Hence, the need to fill up this gap is of urgent need. The aim of this research is to develop a novel risk matrix that ranks the severity impact of highly exploitable vulnerabilities. To achieve this scope we have developed machine learning based model to predict the highly exploitable vulnerabilities to work as background engines to find the most exploitable vulnerabilities out of published known vulnerabilities. Unlike few existing research works, our proposed risk ranking matrix for most exploitable vulnerabilities aggregated all the relevant attributes for base CVSS scoring and the CVSS score itself, the proposed algorithm has ten risk levels which are highly granular and flexible. Furthermore, those risk levels can be redefined and scaled to meet any specific security needs. Finally, a proof of concept tool is also developed to demonstrate the proposed vulnerability prediction framework. The proposed risk ranking matrix can significantly support the security patching management in a proactive and cost-effective way. Moreover, the proposed models need much less computational resources and time, making it suitable for the usage of any scale. � 2023 Author(s). Final 2024-10-14T03:18:32Z 2024-10-14T03:18:32Z 2023 Conference Paper 10.1063/5.0134560 2-s2.0-85161482298 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85161482298&doi=10.1063%2f5.0134560&partnerID=40&md5=dd6dc5b5bdc216618c5ee8137b3c41bf https://irepository.uniten.edu.my/handle/123456789/34231 2808 50004 American Institute of Physics Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker to manipulate the system in some way. Since the late 1980s cyberattacks through exploiting vulnerabilities started to evolve and increasingly becoming sophisticated and dangerous. Successful cyber-attacks are primarily takes place through the exploitation of vulnerabilities. Although thousands of vulnerabilities are being detected and registered each year it has been observed that only few of them get exploited by threat actors. Hence, there is a need to utilize machine learning to develop a model to predict the highly exploitable vulnerabilities by the threat actors and a model to predict the number of future vulnerability to support a cost-effective cyber security management. Subsequently, the predicted exploitable vulnerabilities need to be ranked to understand their severity impact, if the exploitation is realized. The literature reviews show that all the existing machine learning models primarily have utilized United States (U.S) vulnerability database, the largest in its kind, as the source of vulnerability data. The literature review shows that there are existing research works with machine learning approaches to forecast the number of future vulnerabilities and to predict the highly exploitable vulnerabilities, but the literature shows that a risk ranking matrix is missing in this domain. Hence, the need to fill up this gap is of urgent need. The aim of this research is to develop a novel risk matrix that ranks the severity impact of highly exploitable vulnerabilities. To achieve this scope we have developed machine learning based model to predict the highly exploitable vulnerabilities to work as background engines to find the most exploitable vulnerabilities out of published known vulnerabilities. Unlike few existing research works, our proposed risk ranking matrix for most exploitable vulnerabilities aggregated all the relevant attributes for base CVSS scoring and the CVSS score itself, the proposed algorithm has ten risk levels which are highly granular and flexible. Furthermore, those risk levels can be redefined and scaled to meet any specific security needs. Finally, a proof of concept tool is also developed to demonstrate the proposed vulnerability prediction framework. The proposed risk ranking matrix can significantly support the security patching management in a proactive and cost-effective way. Moreover, the proposed models need much less computational resources and time, making it suitable for the usage of any scale. � 2023 Author(s).
author2 57220806665
author_facet 57220806665
Hoque M.S.
Jamil N.
Amin N.
Mansor M.
format Conference Paper
author Hoque M.S.
Jamil N.
Amin N.
Mansor M.
spellingShingle Hoque M.S.
Jamil N.
Amin N.
Mansor M.
Risk-ranking matrix for security patching of exploitable vulnerabilities
author_sort Hoque M.S.
title Risk-ranking matrix for security patching of exploitable vulnerabilities
title_short Risk-ranking matrix for security patching of exploitable vulnerabilities
title_full Risk-ranking matrix for security patching of exploitable vulnerabilities
title_fullStr Risk-ranking matrix for security patching of exploitable vulnerabilities
title_full_unstemmed Risk-ranking matrix for security patching of exploitable vulnerabilities
title_sort risk-ranking matrix for security patching of exploitable vulnerabilities
publisher American Institute of Physics Inc.
publishDate 2024
_version_ 1814061110512320512
score 13.214268