Vulnerability detection and response: Current status and new approaches

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The rapid evolution of industrial components, the paradigm of Industry 4.0, and the new connectivity features introduced by 5G technology all increase the likelihood of cybersecurity incidents. These incidents have to be managed to limit or mitigate their impact, and in most cases, they are a consequence of existing vulnerabilities. This scenario raises the need for a tool that enables a faster (tracking the vulnerability state over time) and more precise (detect root cause) response. The defined Extended Dependency Graph (EDG) model is capable to respond to this need, being able to analyze known vulnerabilities for a given device over time. The EDG model can be applied throughout the entire lifespan of a device to track vulnerabilities, identify new requirements, root causes, and test cases. It also helps prioritize patching activities. This chapter defines the key terms used in vulnerability analysis, as well as the current state of the art of vulnerability analysis in both scientific literature and standards. The EDG model is described in more depth together with its fundamental elements: (1) the directed graph representation of the internal structure of the device, (2) the set of quantitative metrics based on the Common Vulnerability Scoring System (CVSS), and (3) the algorithm to build the EDG for a given device.

Original languageEnglish
Title of host publicationCyberSecurity in a DevOps Environment
Subtitle of host publicationFrom Requirements to Monitoring
PublisherSpringer Nature
Pages95-125
Number of pages31
ISBN (Electronic)9783031422126
ISBN (Print)9783031422119
DOIs
Publication statusPublished - 15 Dec 2023
Externally publishedYes

Keywords

  • CVSS
  • Cybersecurity
  • Embedded systems
  • Industrial components
  • Quantitative metrics
  • Vulnerability analysis
  • Vulnerability detection

Fingerprint

Dive into the research topics of 'Vulnerability detection and response: Current status and new approaches'. Together they form a unique fingerprint.

Cite this