面向虚拟环境的漏洞识别与补丁管理威胁情报框架

Kanchan Patil, Anand Vardhan Malla
{"title":"面向虚拟环境的漏洞识别与补丁管理威胁情报框架","authors":"Kanchan Patil, Anand Vardhan Malla","doi":"10.1109/iciptm54933.2022.9754169","DOIUrl":null,"url":null,"abstract":"Virtualization has become the way of working for the organization in the 21st century. Everything connected to the cloud and workforce moves to virtual machines, and network data is generated exponentially, so make the threats to networks. With attacks getting sophisticated day-to-day cyber security teams must implement new techniques to keep attackers from stealing confidential information from the organizations. Developing patches for these attacks for virtual machine environments is difficult as the attack can happen in any form, and prioritizing patch development is a difficult task with limited information. Threat intelligence is one technique that gives security teams an edge to identify an attack in its root stage by gathering information from different sources. But threat intelligence is usually obtained in an unstructured manner from public sources such as security blogs, mailings, and organization-specific services. Threat intelligence integrated with internally collected network data can identify stressed areas in the network, attacks that usually go unnoticed. Threat intelligence also provides information about attacks, vulnerabilities, and procedures to avoid getting exploited in different organizations. In this paper, we propose a theoretical model for identifying vulnerabilities using internal and external threat intelligence and prioritization of patches based on the impact and sensitivity of the exposed data.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"76 4 1","pages":"787-793"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Threat Intelligence Framework for Vulnerability Identification and Patch Management for Virtual Environment\",\"authors\":\"Kanchan Patil, Anand Vardhan Malla\",\"doi\":\"10.1109/iciptm54933.2022.9754169\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Virtualization has become the way of working for the organization in the 21st century. Everything connected to the cloud and workforce moves to virtual machines, and network data is generated exponentially, so make the threats to networks. With attacks getting sophisticated day-to-day cyber security teams must implement new techniques to keep attackers from stealing confidential information from the organizations. Developing patches for these attacks for virtual machine environments is difficult as the attack can happen in any form, and prioritizing patch development is a difficult task with limited information. Threat intelligence is one technique that gives security teams an edge to identify an attack in its root stage by gathering information from different sources. But threat intelligence is usually obtained in an unstructured manner from public sources such as security blogs, mailings, and organization-specific services. Threat intelligence integrated with internally collected network data can identify stressed areas in the network, attacks that usually go unnoticed. Threat intelligence also provides information about attacks, vulnerabilities, and procedures to avoid getting exploited in different organizations. In this paper, we propose a theoretical model for identifying vulnerabilities using internal and external threat intelligence and prioritization of patches based on the impact and sensitivity of the exposed data.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"76 4 1\",\"pages\":\"787-793\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9754169\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754169","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

虚拟化已经成为21世纪组织的工作方式。连接到云和劳动力的所有东西都转移到虚拟机,网络数据呈指数级增长,因此对网络构成威胁。随着攻击变得越来越复杂,网络安全团队必须实施新技术,以防止攻击者从组织中窃取机密信息。为虚拟机环境开发针对这些攻击的补丁是很困难的,因为攻击可能以任何形式发生,并且在信息有限的情况下确定补丁开发的优先级是一项困难的任务。威胁情报是一种技术,通过从不同来源收集信息,使安全团队在识别攻击的根源阶段具有优势。但是,威胁情报通常以非结构化的方式从公共来源获得,例如安全博客、邮件和组织特定的服务。威胁情报与内部收集的网络数据相结合,可以识别网络中的压力区域,通常不会被注意到的攻击。威胁情报还提供有关攻击、漏洞和过程的信息,以避免在不同的组织中被利用。在本文中,我们提出了一个利用内部和外部威胁情报识别漏洞的理论模型,并根据暴露数据的影响和敏感性确定补丁的优先级。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Threat Intelligence Framework for Vulnerability Identification and Patch Management for Virtual Environment
Virtualization has become the way of working for the organization in the 21st century. Everything connected to the cloud and workforce moves to virtual machines, and network data is generated exponentially, so make the threats to networks. With attacks getting sophisticated day-to-day cyber security teams must implement new techniques to keep attackers from stealing confidential information from the organizations. Developing patches for these attacks for virtual machine environments is difficult as the attack can happen in any form, and prioritizing patch development is a difficult task with limited information. Threat intelligence is one technique that gives security teams an edge to identify an attack in its root stage by gathering information from different sources. But threat intelligence is usually obtained in an unstructured manner from public sources such as security blogs, mailings, and organization-specific services. Threat intelligence integrated with internally collected network data can identify stressed areas in the network, attacks that usually go unnoticed. Threat intelligence also provides information about attacks, vulnerabilities, and procedures to avoid getting exploited in different organizations. In this paper, we propose a theoretical model for identifying vulnerabilities using internal and external threat intelligence and prioritization of patches based on the impact and sensitivity of the exposed data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信