In the last three years, the unprecedented increase in discovered vulnerabilities ranked with critical and high severity raise new challenges in Vulnerability Risk Management (VRM). Indeed, identifying, analyzing and remediating this high rate of vulnerabilities is labour intensive, especially for enterprises dealing with complex computing infrastructures such as Infrastructure-as-a-Service providers. Hence there is a demand for new criteria to prioritize vulnerabilities remediation and new automated/autonomic approaches to VRM.In this paper, we address the above challenge proposing an Automated Context-aware Vulnerability Risk Management (ACVRM) methodology that aims: To reduce the labour intensive tasks of security experts; to prioritize vulnerability remediation on the basis of the organization context rather than risk severity only. The proposed solution considers multiple vulnerabilities databases to have a great coverage on known vulnerabilities and to determine the vulnerability rank. After the description of the new VRM methodology, we focus on the problem of obtaining a single vulnerability score by normalization and fusion of ranks obtained from multiple vulnerabilities databases. Our solution is a parametric normalization that accounts for organization needs/specifications.

Normalization of Severity Rating for Automated Context-aware Vulnerability Risk Management / Ahmadi, V.; Arlos, P.; Casalicchio, E.. - (2020), pp. 200-205. (Intervento presentato al convegno 1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020 tenutosi a usa) [10.1109/ACSOS-C51401.2020.00056].

Normalization of Severity Rating for Automated Context-aware Vulnerability Risk Management

Casalicchio E.
2020

Abstract

In the last three years, the unprecedented increase in discovered vulnerabilities ranked with critical and high severity raise new challenges in Vulnerability Risk Management (VRM). Indeed, identifying, analyzing and remediating this high rate of vulnerabilities is labour intensive, especially for enterprises dealing with complex computing infrastructures such as Infrastructure-as-a-Service providers. Hence there is a demand for new criteria to prioritize vulnerabilities remediation and new automated/autonomic approaches to VRM.In this paper, we address the above challenge proposing an Automated Context-aware Vulnerability Risk Management (ACVRM) methodology that aims: To reduce the labour intensive tasks of security experts; to prioritize vulnerability remediation on the basis of the organization context rather than risk severity only. The proposed solution considers multiple vulnerabilities databases to have a great coverage on known vulnerabilities and to determine the vulnerability rank. After the description of the new VRM methodology, we focus on the problem of obtaining a single vulnerability score by normalization and fusion of ranks obtained from multiple vulnerabilities databases. Our solution is a parametric normalization that accounts for organization needs/specifications.
2020
1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020
automation; Risk Assessment; self-protection; vulnerability
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Normalization of Severity Rating for Automated Context-aware Vulnerability Risk Management / Ahmadi, V.; Arlos, P.; Casalicchio, E.. - (2020), pp. 200-205. (Intervento presentato al convegno 1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020 tenutosi a usa) [10.1109/ACSOS-C51401.2020.00056].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1571989
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 3
social impact