Show simple item record

dc.contributor.authorSharma, Gaurav
dc.contributor.authorVidalis, Stilianos
dc.contributor.authorMenon, Catherine
dc.contributor.authorAnand, Niharika
dc.date.accessioned2024-01-22T14:15:03Z
dc.date.available2024-01-22T14:15:03Z
dc.date.issued2023-05-30
dc.identifier.citationSharma , G , Vidalis , S , Menon , C & Anand , N 2023 , ' Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases ' , Multimedia Tools and Applications , vol. 82 , pp. 16951–16971 . https://doi.org/10.1007/s11042-022-14036-y
dc.identifier.issn1380-7501
dc.identifier.otherORCID: /0000-0003-2072-5845/work/151127191
dc.identifier.urihttp://hdl.handle.net/2299/27450
dc.description© 2022 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1007/s11042-022-14036-y
dc.description.abstractProactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the prioritization of threats. The existing models and methodology follow the traditional approaches of a Common Vulnerability Scoring System (CVSS) to prioritize threats and vulnerabilities. The CVSS is not able to provide effectiveness to the security of the business of an organization. In contrast, the vulnerability analysis needs a model which can give significance to the prioritization policies. The model depends on the CVSS score of threats and compares various features of vulnerability like threat vectors, inputs, environments used by threat agent’s groups, and potential outputs of threat agents. Therefore, the research aims to design a semi-automatic model for vulnerability analysis of threats for the National Institute of Standards and Technology (NIST) database of cyber-crime. We have developed a semi-automatic model that simulates the CVE (Common Vulnerabilities and Exposures) list of the NIST database between 1999 and 2021, concerning the resources used by the threat agents, pre-requisites input, attack vectors, and dormant results. The semi-automatic approach of the model to perform the vulnerability analysis of threat agent groups identified in a network makes the model more efficient and effective to addresses the profiling of threat agents and evaluating the CTI (Critical Threat intelligence feed). Our experimental results imply that the semi-automatic model implements the vulnerability prioritization based on the CVSS score and uses the comparative analysis based on the threat agent’s vectors identified. It also provides potency and optimized complexity to an organization’s business to mitigate the vulnerability identified in a network.en
dc.format.extent21
dc.format.extent1540608
dc.language.isoeng
dc.relation.ispartofMultimedia Tools and Applications
dc.subjectCVSS
dc.subjectNIST database
dc.subjectSecurity management
dc.subjectThreat agent vectors
dc.subjectVulnerability
dc.subjectSoftware
dc.subjectMedia Technology
dc.subjectHardware and Architecture
dc.subjectComputer Networks and Communications
dc.titleAnalysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databasesen
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionCentre for Future Societies Research
dc.contributor.institutionDepartment of Pharmacy, Pharmacology and Postgraduate Medicine
dc.description.statusPeer reviewed
dc.date.embargoedUntil2023-11-02
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85141135275&partnerID=8YFLogxK
rioxxterms.versionofrecord10.1007/s11042-022-14036-y
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record