Abstract:
The vulnerability monitoring and prioritizing could be challenging for enterprise security stakeholders. With a number of vulnerabilities published regularly, few of the ...Show MoreMetadata
Abstract:
The vulnerability monitoring and prioritizing could be challenging for enterprise security stakeholders. With a number of vulnerabilities published regularly, few of the vulnerabilities result in real-life attacks. However, no matter how slight the possibility of vulnerabilities could result in an exploit, proactive attention is given to vulnerability related information by the cybersecurity community. Researchers aim to consolidate the information regarding vulnerabilities, including but not limited to CVSS, vulnerability description, vulnerability mentioned on a different platform including social media platforms, dark web. The presented work in this paper is motivated to map released vulnerabilities to exposed exploits and vice versa. The mapping could result in one of the features to approximate the possibility of exploiting a vulnerability. The proposed work is accomplished in the form of a search tool to find relevant vulnerabilities for the given exploit title and vice versa
Published in: 2021 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)
Date of Conference: 29-30 October 2021
Date Added to IEEE Xplore: 21 December 2021
ISBN Information: