2021
DOI: 10.3390/app11188735
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Management Models Using a Common Vulnerability Scoring System

Abstract: Vulnerability prioritization is an essential element of the vulnerability management process in data communication networks. Accurate prioritization allows the attention to be focused on the most critical vulnerabilities and their timely elimination; otherwise, organizations may face severe financial consequences or damage to their reputations. In addition, the large amounts of data generated by various components of security systems further impede the process of prioritizing the detected vulnerabilities. Ther… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…A notable reduction of the final CVSS 3.x accuracy when compared with the individual components resulted from the fact that the final value of the CVSS 3.x was calculated using mathematical formulas linking the eight vector components. Finally, we note that the described ML-based solution can be applied to replace the CVSS 2.0 standard with the CVSS 3.x one during the vulnerability management process in vulnerability management centres [ 22 ]. This is important because, using the newer CVSS 3.x standard, it is possible to more accurately estimate the level of asset security, especially when taking into account the context of a particular organisation environment.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A notable reduction of the final CVSS 3.x accuracy when compared with the individual components resulted from the fact that the final value of the CVSS 3.x was calculated using mathematical formulas linking the eight vector components. Finally, we note that the described ML-based solution can be applied to replace the CVSS 2.0 standard with the CVSS 3.x one during the vulnerability management process in vulnerability management centres [ 22 ]. This is important because, using the newer CVSS 3.x standard, it is possible to more accurately estimate the level of asset security, especially when taking into account the context of a particular organisation environment.…”
Section: Discussionmentioning
confidence: 99%
“…Further, it is known that the CVSS 2.0 does not provide an accurate measure of IT infrastructure security, because the Target Distribution ( ) parameter underestimates the assessment of all detected vulnerabilities. The CVSS 3.x standard, on the other hand, gives a more accurate assessment of threats’ criticality including organisation context, which directly translates into a higher level of protection against hacker attacks [ 18 , 22 ]. Summarising, there are clear benefits to using the newer 3.x standard.…”
Section: Introductionmentioning
confidence: 99%
“…For this, they rely on the evidence collected from the cloud service providers, and determine the level of trust with respect to the infrastructure of a given provider, and quantify its capability to comply with the expected security policy. The authors of [22] also evaluate the risk associated to each cloud environment based on a quantification and classification of vulnerabilities inherent to the environment. Approaches, such as [23], target orchestrating security chains, including firewalls and intrusion detection systems, in order to protect cloud resources.…”
Section: Related Workmentioning
confidence: 99%
“…Conversely, vulnerability management includes continuous reporting, remediation, and evaluation procedures (Walkowski et al, 2021). The first step of the assessment process involves determining and categorizing the IT infrastructure's vulnerabilities.…”
Section: Vulnerability Assessment and Managementmentioning
confidence: 99%