A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems

Santanam Kasturi, Xiaolong Li, Peng Li, John Pickard
{"title":"A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems","authors":"Santanam Kasturi, Xiaolong Li, Peng Li, John Pickard","doi":"10.11648/j.ajnc.20241301.12","DOIUrl":null,"url":null,"abstract":"This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper analysis of the Common Weakness Enumeration (CWE) and Common Vulnerability Exposure (CVE) mapping to individual vulnerabilities. By further relating to a parent, peer, or child CWE (including CWEs that follow another CWE and in some cases precede other CWEs) will provide more insight into the attack patterns. These patterns will reveal a multi-vulnerability, multi-application attack pattern which will be hard to visualize without data consolidation and correlation analysis. The correlation analysis tied to the test and scan data supports a vulnerability lineage starting from incoming requests to individual vulnerabilities found in the code that traces a possible attack path. This solution, if automated, can provide threat alerts and immediate focus on vulnerabilities that need to be remedied as a priority. SOAR (Security Orchestration, Automation, and Response), XSOAR (Extended Security Orchestration, Automation, and Response), SIEM (Security Information and Event Management), and XDR (Extended Detection and Response) are more constructed to suit networks, infrastructure and devices, and sensors; not meant for application security vulnerability information as collected. So, this paper makes a special case that must be made for integration of application security information as part of threat intelligence, and threat and incident response systems.\n","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"28 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American Journal of Networks and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11648/j.ajnc.20241301.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper analysis of the Common Weakness Enumeration (CWE) and Common Vulnerability Exposure (CVE) mapping to individual vulnerabilities. By further relating to a parent, peer, or child CWE (including CWEs that follow another CWE and in some cases precede other CWEs) will provide more insight into the attack patterns. These patterns will reveal a multi-vulnerability, multi-application attack pattern which will be hard to visualize without data consolidation and correlation analysis. The correlation analysis tied to the test and scan data supports a vulnerability lineage starting from incoming requests to individual vulnerabilities found in the code that traces a possible attack path. This solution, if automated, can provide threat alerts and immediate focus on vulnerabilities that need to be remedied as a priority. SOAR (Security Orchestration, Automation, and Response), XSOAR (Extended Security Orchestration, Automation, and Response), SIEM (Security Information and Event Management), and XDR (Extended Detection and Response) are more constructed to suit networks, infrastructure and devices, and sensors; not meant for application security vulnerability information as collected. So, this paper makes a special case that must be made for integration of application security information as part of threat intelligence, and threat and incident response systems.
将应用程序安全漏洞数据与事故响应系统集成的拟议方法
本文提出了一种方法,通过测试和扫描发现的应用程序漏洞数据,以及使用 Web 应用程序防火墙(WAF)工具监控的传入事务请求进行的关联分析,建立攻击树。攻击树通过漏洞链接以及对常见弱点枚举(CWE)和常见漏洞暴露(CVE)与单个漏洞映射的深入分析,显示了攻击形成的多种途径。通过进一步联系父级、同级或子级 CWE(包括在另一个 CWE 之后的 CWE,以及在某些情况下在其他 CWE 之前的 CWE),可以更深入地了解攻击模式。这些模式将揭示一种多漏洞、多应用的攻击模式,如果不进行数据整合和关联分析,将很难直观地看到这种模式。与测试和扫描数据相关联的关联分析支持从传入请求到代码中发现的单个漏洞的漏洞脉络,从而追踪可能的攻击路径。该解决方案如果实现自动化,就能提供威胁警报,并立即关注需要优先修复的漏洞。SOAR(安全编排、自动化和响应)、XSOAR(扩展安全编排、自动化和响应)、SIEM(安全信息和事件管理)和 XDR(扩展检测和响应)更多是针对网络、基础设施、设备和传感器而设计的,而不是为收集应用安全漏洞信息而设计的。因此,本文提出了一种特殊情况,即必须将应用安全信息整合为威胁情报、威胁和事件响应系统的一部分。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信