Cargando…
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases
Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the prioritization of threats. The existing models and method...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628632/ https://www.ncbi.nlm.nih.gov/pubmed/36339055 http://dx.doi.org/10.1007/s11042-022-14036-y |
_version_ | 1784823231045173248 |
---|---|
author | Sharma, Gaurav Vidalis, Stilianos Menon, Catherine Anand, Niharika |
author_facet | Sharma, Gaurav Vidalis, Stilianos Menon, Catherine Anand, Niharika |
author_sort | Sharma, Gaurav |
collection | PubMed |
description | Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the prioritization of threats. The existing models and methodology follow the traditional approaches of a Common Vulnerability Scoring System (CVSS) to prioritize threats and vulnerabilities. The CVSS is not able to provide effectiveness to the security of the business of an organization. In contrast, the vulnerability analysis needs a model which can give significance to the prioritization policies. The model depends on the CVSS score of threats and compares various features of vulnerability like threat vectors, inputs, environments used by threat agent’s groups, and potential outputs of threat agents. Therefore, the research aims to design a semi-automatic model for vulnerability analysis of threats for the National Institute of Standards and Technology (NIST) database of cyber-crime. We have developed a semi-automatic model that simulates the CVE (Common Vulnerabilities and Exposures) list of the NIST database between 1999 and 2021, concerning the resources used by the threat agents, pre-requisites input, attack vectors, and dormant results. The semi-automatic approach of the model to perform the vulnerability analysis of threat agent groups identified in a network makes the model more efficient and effective to addresses the profiling of threat agents and evaluating the CTI (Critical Threat intelligence feed). Our experimental results imply that the semi-automatic model implements the vulnerability prioritization based on the CVSS score and uses the comparative analysis based on the threat agent’s vectors identified. It also provides potency and optimized complexity to an organization’s business to mitigate the vulnerability identified in a network. |
format | Online Article Text |
id | pubmed-9628632 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-96286322022-11-02 Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases Sharma, Gaurav Vidalis, Stilianos Menon, Catherine Anand, Niharika Multimed Tools Appl Article Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the prioritization of threats. The existing models and methodology follow the traditional approaches of a Common Vulnerability Scoring System (CVSS) to prioritize threats and vulnerabilities. The CVSS is not able to provide effectiveness to the security of the business of an organization. In contrast, the vulnerability analysis needs a model which can give significance to the prioritization policies. The model depends on the CVSS score of threats and compares various features of vulnerability like threat vectors, inputs, environments used by threat agent’s groups, and potential outputs of threat agents. Therefore, the research aims to design a semi-automatic model for vulnerability analysis of threats for the National Institute of Standards and Technology (NIST) database of cyber-crime. We have developed a semi-automatic model that simulates the CVE (Common Vulnerabilities and Exposures) list of the NIST database between 1999 and 2021, concerning the resources used by the threat agents, pre-requisites input, attack vectors, and dormant results. The semi-automatic approach of the model to perform the vulnerability analysis of threat agent groups identified in a network makes the model more efficient and effective to addresses the profiling of threat agents and evaluating the CTI (Critical Threat intelligence feed). Our experimental results imply that the semi-automatic model implements the vulnerability prioritization based on the CVSS score and uses the comparative analysis based on the threat agent’s vectors identified. It also provides potency and optimized complexity to an organization’s business to mitigate the vulnerability identified in a network. Springer US 2022-11-02 2023 /pmc/articles/PMC9628632/ /pubmed/36339055 http://dx.doi.org/10.1007/s11042-022-14036-y Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Sharma, Gaurav Vidalis, Stilianos Menon, Catherine Anand, Niharika Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases |
title | Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases |
title_full | Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases |
title_fullStr | Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases |
title_full_unstemmed | Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases |
title_short | Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases |
title_sort | analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in nist databases |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628632/ https://www.ncbi.nlm.nih.gov/pubmed/36339055 http://dx.doi.org/10.1007/s11042-022-14036-y |
work_keys_str_mv | AT sharmagaurav analysisandimplementationofsemiautomaticmodelforvulnerabilityexploitationsofthreatagentsinnistdatabases AT vidalisstilianos analysisandimplementationofsemiautomaticmodelforvulnerabilityexploitationsofthreatagentsinnistdatabases AT menoncatherine analysisandimplementationofsemiautomaticmodelforvulnerabilityexploitationsofthreatagentsinnistdatabases AT anandniharika analysisandimplementationofsemiautomaticmodelforvulnerabilityexploitationsofthreatagentsinnistdatabases |