Loading [MathJax]/extensions/MathMenu.js
BM25 Algorithm Driven Search Tool for Linking Exploits to Vulnerabilities | IEEE Conference Publication | IEEE Xplore

BM25 Algorithm Driven Search Tool for Linking Exploits to Vulnerabilities


Abstract:

The vulnerability monitoring and prioritizing could be challenging for enterprise security stakeholders. With a number of vulnerabilities published regularly, few of the ...Show More

Abstract:

The vulnerability monitoring and prioritizing could be challenging for enterprise security stakeholders. With a number of vulnerabilities published regularly, few of the vulnerabilities result in real-life attacks. However, no matter how slight the possibility of vulnerabilities could result in an exploit, proactive attention is given to vulnerability related information by the cybersecurity community. Researchers aim to consolidate the information regarding vulnerabilities, including but not limited to CVSS, vulnerability description, vulnerability mentioned on a different platform including social media platforms, dark web. The presented work in this paper is motivated to map released vulnerabilities to exposed exploits and vice versa. The mapping could result in one of the features to approximate the possibility of exploiting a vulnerability. The proposed work is accomplished in the form of a search tool to find relevant vulnerabilities for the given exploit title and vice versa
Date of Conference: 29-30 October 2021
Date Added to IEEE Xplore: 21 December 2021
ISBN Information:
Conference Location: Pune, India

Contact IEEE to Subscribe

References

References is not available for this document.