The Community for Technology Leaders
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2014)
Atlanta, GA, USA
June 23, 2014 to June 26, 2014
ISBN: 978-1-4799-2233-8
pp: 684-689
ABSTRACT
Computing a prioritized set of vulnerabilities to patch is important for system administrators to determine the order of vulnerabilities to be patched that are more critical to the network security. One way to assess and analyze security to find vulnerabilities to be patched is to use attack representation models (ARMs). However, security solutions using ARMs are optimized for only the current state of the networked system. Therefore, the ARM must reanalyze the network security, causing multiple iterations of the same task to obtain the prioritized set of vulnerabilities to patch. To address this problem, we propose to use importance measures to rank network hosts and vulnerabilities, then combine these measures to prioritize the order of vulnerabilities to be patched. We show that nearly equivalent prioritized set of vulnerabilities can be computed in comparison to an exhaustive search method in various network scenarios, while the performance of computing the set is dramatically improved, while equivalent solutions are computed in various network scenarios.
INDEX TERMS
Security, Measurement, Computational modeling, Equations, Mathematical model, Scalability, Analytical models,Vulnerability Patch, Attack Representation Model, Network Centrality, Security Analysis, Security Management, Security Metrics
CITATION
Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq, "What Vulnerability Do We Need to Patch First?", 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), vol. 00, no. , pp. 684-689, 2014, doi:10.1109/DSN.2014.68
90 ms
(Ver 3.3 (11022016))