A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

被引:3
作者
Bennouk, Khalid [1 ]
Aali, Nawal Ait [1 ,2 ]
Idrissi, Younes El Bouzekri E. [1 ]
Sebai, Bechir [3 ,4 ]
Faroukhi, Abou Zakaria [1 ]
Mahouachi, Dorra [3 ]
机构
[1] Ibn Tofail Univ, Natl Sch Appl Sci, Engn Sci Lab, Kenitra 14000, Morocco
[2] Mohammed V Univ, Fac Law Econ & Social Sci Souissi, Lab Econ Anal & Modelling, Rabat 12000, Morocco
[3] ACG Cybersecur Head Off, 3 Soufflot St,Cabinet PCH, F-75005 Paris, France
[4] Lab ACG Cybersecur, 5-7 Bellini St,Campus Cyber, F-92800 Paris, France
来源
JOURNAL OF CYBERSECURITY AND PRIVACY | 2024年 / 4卷 / 04期
关键词
vulnerability detection; CPE; CVE; CWE; AI model; graph representation; feature model; similarity matching algorithm; VMS; cybersecurity; AUTOMATED-ANALYSIS; FRAMEWORK; ALGORITHMS; CHALLENGES; INTERNET; SYSTEM; GRAPH;
D O I
10.3390/jcp4040040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack vectors and possible exploits. In this context, several organizations adopt strategies to protect their data, technologies, and infrastructures from cyberattacks by implementing anticipatory and proactive approaches to their system security activities. To this end, vulnerability management systems play a crucial role in mitigating the impact of cyberattacks by identifying potential vulnerabilities within an organization and alerting cyber teams. However, the effectiveness of these systems, which employ multiple methods and techniques to identify weaknesses, relies heavily on the accuracy of published security events. For this reason, we introduce a discussion concerning existing vulnerability detection methods through an in-depth literature study of several research papers. Based on the results, this paper points out some issues related to vulnerability databases handling that impact the effectiveness of certain vulnerability identification methods. Furthermore, after summarizing the existing methodologies, this study classifies them into four approaches and discusses the challenges, findings, and potential research directions.
引用
收藏
页码:853 / 908
页数:56
相关论文
共 241 条
[1]  
A Manjunatha, 2024, Procedia Computer Science, V235, P3105, DOI 10.1016/j.procs.2024.04.294
[2]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[3]   Optimizing Smart Home Intrusion Detection With Harmony-Enhanced Extra Trees [J].
Abdusalomov, Akmalbek ;
Kilichev, Dusmurod ;
Nasimov, Rashid ;
Rakhmatullayev, Ilkhom ;
Im Cho, Young .
IEEE ACCESS, 2024, 12 :117761-117786
[4]  
Admass Wasyihun Sema, 2024, Cyber Security and Applications, V2, DOI 10.1016/j.csa.2023.100031
[5]  
Aghaei E, 2023, Arxiv, DOI arXiv:2309.03040
[6]   Metaheuristic Algorithms on Feature Selection: A Survey of One Decade of Research (2009-2019) [J].
Agrawal, Prachi ;
Abutarboush, Hattan F. ;
Ganesh, Talari ;
Mohamed, Ali Wagdy .
IEEE ACCESS, 2021, 9 :26766-26791
[7]   Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey [J].
Ahmad, Waqas ;
Rasool, Aamir ;
Javed, Abdul Rehman ;
Baker, Thar ;
Jalil, Zunera .
ELECTRONICS, 2022, 11 (01)
[8]  
Aladics T., 2023, P INT C SOFTW TECHN, DOI [10.1007/978-3-031-37231-58, DOI 10.1007/978-3-031-37231-58]
[9]  
Sanguino LAB, 2017, Arxiv, DOI arXiv:1705.05347
[10]  
Alfasi D, 2024, Arxiv, DOI arXiv:2403.02014