{"title":"面向虚拟环境的漏洞识别与补丁管理威胁情报框架","authors":"Kanchan Patil, Anand Vardhan Malla","doi":"10.1109/iciptm54933.2022.9754169","DOIUrl":null,"url":null,"abstract":"Virtualization has become the way of working for the organization in the 21st century. Everything connected to the cloud and workforce moves to virtual machines, and network data is generated exponentially, so make the threats to networks. With attacks getting sophisticated day-to-day cyber security teams must implement new techniques to keep attackers from stealing confidential information from the organizations. Developing patches for these attacks for virtual machine environments is difficult as the attack can happen in any form, and prioritizing patch development is a difficult task with limited information. Threat intelligence is one technique that gives security teams an edge to identify an attack in its root stage by gathering information from different sources. But threat intelligence is usually obtained in an unstructured manner from public sources such as security blogs, mailings, and organization-specific services. Threat intelligence integrated with internally collected network data can identify stressed areas in the network, attacks that usually go unnoticed. Threat intelligence also provides information about attacks, vulnerabilities, and procedures to avoid getting exploited in different organizations. In this paper, we propose a theoretical model for identifying vulnerabilities using internal and external threat intelligence and prioritization of patches based on the impact and sensitivity of the exposed data.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"76 4 1","pages":"787-793"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Threat Intelligence Framework for Vulnerability Identification and Patch Management for Virtual Environment\",\"authors\":\"Kanchan Patil, Anand Vardhan Malla\",\"doi\":\"10.1109/iciptm54933.2022.9754169\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Virtualization has become the way of working for the organization in the 21st century. Everything connected to the cloud and workforce moves to virtual machines, and network data is generated exponentially, so make the threats to networks. With attacks getting sophisticated day-to-day cyber security teams must implement new techniques to keep attackers from stealing confidential information from the organizations. Developing patches for these attacks for virtual machine environments is difficult as the attack can happen in any form, and prioritizing patch development is a difficult task with limited information. Threat intelligence is one technique that gives security teams an edge to identify an attack in its root stage by gathering information from different sources. But threat intelligence is usually obtained in an unstructured manner from public sources such as security blogs, mailings, and organization-specific services. Threat intelligence integrated with internally collected network data can identify stressed areas in the network, attacks that usually go unnoticed. Threat intelligence also provides information about attacks, vulnerabilities, and procedures to avoid getting exploited in different organizations. In this paper, we propose a theoretical model for identifying vulnerabilities using internal and external threat intelligence and prioritization of patches based on the impact and sensitivity of the exposed data.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"76 4 1\",\"pages\":\"787-793\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9754169\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9754169","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Threat Intelligence Framework for Vulnerability Identification and Patch Management for Virtual Environment
Virtualization has become the way of working for the organization in the 21st century. Everything connected to the cloud and workforce moves to virtual machines, and network data is generated exponentially, so make the threats to networks. With attacks getting sophisticated day-to-day cyber security teams must implement new techniques to keep attackers from stealing confidential information from the organizations. Developing patches for these attacks for virtual machine environments is difficult as the attack can happen in any form, and prioritizing patch development is a difficult task with limited information. Threat intelligence is one technique that gives security teams an edge to identify an attack in its root stage by gathering information from different sources. But threat intelligence is usually obtained in an unstructured manner from public sources such as security blogs, mailings, and organization-specific services. Threat intelligence integrated with internally collected network data can identify stressed areas in the network, attacks that usually go unnoticed. Threat intelligence also provides information about attacks, vulnerabilities, and procedures to avoid getting exploited in different organizations. In this paper, we propose a theoretical model for identifying vulnerabilities using internal and external threat intelligence and prioritization of patches based on the impact and sensitivity of the exposed data.