Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning

被引:1
作者
Ullman, Steven [1 ]
Samtani, Sagar [2 ]
Zhu, Hongyi [1 ]
Lazarine, Ben [2 ]
Chen, Hsinchun [3 ]
Nunamaker Jr, Jay F. [3 ]
机构
[1] Univ Texas San Antonio, Alvarez Coll Business, San Antonio, TX USA
[2] Indiana Univ, Kelley Sch Business, Bloomington, IN USA
[3] Univ Arizona, Eller Coll Management, Tucson, AZ USA
基金
美国国家科学基金会;
关键词
Online vulnerability; multi-view representation learning; attention mechanisms; cybersecurity; deep learning; cyberinfrastructure; design science; cloud computing; asset clustering; DESIGN SCIENCE RESEARCH; PREDICTIVE ANALYTICS; RISK; IDENTIFICATION; COMPETITION; TECHNOLOGY; FRAMEWORK; HACKERS; MODELS; SYSTEM;
D O I
10.1080/07421222.2024.2376384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity is a present and growing concern that needs to be addressed with both behavioral and design-oriented research. Public cloud providers such as Amazon Web Services and federal funding agencies such as the National Science Foundation have invested billions of dollars into developing high-performance computing resources accessible to users through configurable virtual machine (VM) images. This approach offers users the flexibility of changing and updating their environment for their computational needs. Despite the substantial benefits, users often introduce thousands of vulnerabilities by installing open-source software packages and misconfiguring file systems. Given the scale of vulnerabilities, security personnel struggle to identify and prioritize vulnerable assets for remediation. In this research, we designed a novel unsupervised deep learning-based Multi-View Combinatorial-Attentive Autoencoder (MV-CAAE) to capture multi-dimensional vulnerability data and automatically identify groups of similar vulnerable compute instances to help facilitate the development of targeted remediation strategies. We rigorously evaluated the proposed MV-CAAE against state-of-the-art methods in three technical clustering experiments. Experiment results indicate that the MV-CAAE achieves V-measure scores (metric of cluster quality) 8 percent-48 percent higher than benchmark methods. We demonstrated the practical value through a comprehensive case study by clustering vulnerable VMs and gathering qualitative feedback from experienced security professionals through semi-structured interviews. The results indicated that clustering vulnerable assets can help prioritize vulnerable instances for remediation and enhance decision-making tasks. The present design-research work also contributes to our theoretical knowledge of cyber-defense.
引用
收藏
页码:708 / 743
页数:36
相关论文
共 94 条
[61]   Characteristic Functions on Graphs: Birds of a Feather, from Statistical Descriptors to Parametric Models [J].
Rozemberczki, Benedek ;
Sarkar, Rik .
CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, :1325-1334
[62]   Karate Club: An API Oriented Open-Source Python']Python Framework for Unsupervised Learning on Graphs [J].
Rozemberczki, Benedek ;
Kiss, Oliver ;
Sarkar, Rik .
CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, :3125-3132
[63]   Deep Learning for Information Systems Research [J].
Samtani, Sagar ;
Zhu, Hongyi ;
Padmanabhan, Balaji ;
Chai, Yidong ;
Chen, Hsinchun ;
Nunamaker, Jay F. F. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2023, 40 (01) :271-301
[64]   LINKING EXPLOITS FROM THE DARK WEB TO KNOWN VULNERABILITIES FOR PROACTIVE CYBER THREAT INTELLIGENCE: AN ATTENTION-BASED DEEP STRUCTURED SEMANTIC MODEL [J].
Samtani, Sagar ;
Chai, Yidong ;
Chen, Hsinchun .
MIS QUARTERLY, 2022, 46 (02) :911-946
[65]   Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap [J].
Samtani, Sagar ;
Kantarcioglu, Murat ;
Chen, Hsinchun .
ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2020, 11 (04)
[66]   Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence [J].
Samtani, Sagar ;
Chinn, Ryan ;
Chen, Hsinchun ;
Nunamaker, Jay F., Jr. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) :1023-1053
[67]   Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets [J].
Sen, Ravi ;
Verma, Ajay ;
Heim, Gregory R. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2020, 37 (01) :191-216
[68]  
Sonnenberg Christian, 2012, Design Science Research in Information Systems. Advances in Theory and Practice. Proceedings 7th International Conference, DESRIST 2012, P381, DOI 10.1007/978-3-642-29863-9_28
[69]   Coping with systems risk: Security planning models for management decision making [J].
Straub, DW ;
Welke, RJ .
MIS QUARTERLY, 1998, 22 (04) :441-469
[70]   DEFT: A Distributed IoT Fingerprinting Technique [J].
Thangavelu, Vijayanand ;
Divakaran, Dinil Mon ;
Sairam, Rishi ;
Bhunia, Suman Sankar ;
Gurusamy, Mohan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :940-952