Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases

Gaurav Sharma, Stilianos Vidalis, Catherine Menon, Niharika Anand

Research output: Contribution to journalArticlepeer-review

71 Downloads (Pure)

Abstract

Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the prioritization of threats. The existing models and methodology follow the traditional approaches of a Common Vulnerability Scoring System (CVSS) to prioritize threats and vulnerabilities. The CVSS is not able to provide effectiveness to the security of the business of an organization. In contrast, the vulnerability analysis needs a model which can give significance to the prioritization policies. The model depends on the CVSS score of threats and compares various features of vulnerability like threat vectors, inputs, environments used by threat agent’s groups, and potential outputs of threat agents. Therefore, the research aims to design a semi-automatic model for vulnerability analysis of threats for the National Institute of Standards and Technology (NIST) database of cyber-crime. We have developed a semi-automatic model that simulates the CVE (Common Vulnerabilities and Exposures) list of the NIST database between 1999 and 2021, concerning the resources used by the threat agents, pre-requisites input, attack vectors, and dormant results. The semi-automatic approach of the model to perform the vulnerability analysis of threat agent groups identified in a network makes the model more efficient and effective to addresses the profiling of threat agents and evaluating the CTI (Critical Threat intelligence feed). Our experimental results imply that the semi-automatic model implements the vulnerability prioritization based on the CVSS score and uses the comparative analysis based on the threat agent’s vectors identified. It also provides potency and optimized complexity to an organization’s business to mitigate the vulnerability identified in a network.
Original languageEnglish
Pages (from-to)16951–16971
Number of pages21
JournalMultimedia Tools and Applications
Volume82
Early online date2 Nov 2022
DOIs
Publication statusPublished - 30 May 2023

Keywords

  • CVSS
  • NIST database
  • Security management
  • Threat agent vectors
  • Vulnerability

Fingerprint

Dive into the research topics of 'Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases'. Together they form a unique fingerprint.

Cite this