Dynamic Data Updates and Weight Optimization for Predicting Vulnerability Exploitability

被引:0
作者
Bennouk, K. [1 ]
Mahouachi, D. [2 ]
Aali, N. Ait [1 ,3 ]
El Bouzekri El Idrissi, Y. [1 ]
Sebai, B. [2 ,4 ]
Faroukhi, A. Z. [1 ]
机构
[1] Ibn Tofail Univ, Natl Sch Appl Sci, Engn Sci Lab, Kenitra 14000, Morocco
[2] ACG Cybersecur Head Off, F-75005 Paris, France
[3] Mohammed V Univ Rabat, Lab Econ Anal & Modelling, FSJES Souissi, Rabat, Morocco
[4] Lab ACG Cybersecur, Campus Cyber, F-92800 Paris, France
关键词
Predictive models; Measurement; Feature extraction; Databases; Computer security; Accuracy; Metadata; Biological system modeling; Analytical models; Systematic literature review; AHP; CVE; CVSS; CNN; NIST; GBM XGBoost; SMOTE; random forest;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the purpose of managing efficiency in a large number of published vulnerabilities, the time-intensive process requires significant effort and efficient vulnerability prioritization procedures. In order to enhance the cybersecurity defense posture, it becomes imperative to ensure alignment with risk tolerance and business needs, making vulnerability management critical for reducing cybersecurity risks, avoiding system breaches, and optimizing organizational resources. However, traditional methods often struggle with accuracy due to static datasets and inconsistent scoring methodologies, leading to challenges in prioritizing vulnerabilities and exposing systems to significant risks. This study aims to propose a novel approach for predicting the exploitability of vulnerabilities using dynamic, continuously updated datasets and advanced learning models. A novel exploitability scoring equation is introduced and rigorously assessed through four methods: the Analytic Hierarchy Process, regression analysis, and two supervised learning models. The methodology incorporates machine learning and deep learning models to compute and predict exploitability scores, following the initial data processing and scoring calculation steps. The research framework integrates data ingestion, cleaning, and correlation processes to ensure data accuracy. It employs a dynamic dataset that is continuously updated with enriched data from diverse sources such as the National Vulnerability Database, ExploitDB, MITRE ATT&CK, and Vulners. Experimental results demonstrate a significant improvement in model training, with an accuracy of 84%. Furthermore, the predictive model achieved 82.9% accuracy in classifying vulnerabilities as exploitable or not, highlighting the importance of dynamic datasets and the comprehensive framework used to enhance vulnerability.
引用
收藏
页码:65266 / 65284
页数:19
相关论文
共 40 条
[1]  
Abdirahman A. A., 2024, Int. J. Electr. Comput. Eng. (IJECE), V14, P4551, DOI [10.11591/ijece.v14i4.pp4551-4562, DOI 10.11591/IJECE.V14I4.PP4551-4562]
[2]  
Akinade AO., 2025, Int J Multidiscip Res Growth Eval, V6, P26
[3]   Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them [J].
Alabdulatif, Abdullah ;
Thilakarathne, Navod Neranjan .
COMPUTERS, 2025, 14 (01)
[4]  
[Anonymous], NVD - Vulnerabilities
[5]  
[Anonymous], NVD - Vulnerability Metrics
[6]   A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies [J].
Bennouk, Khalid ;
Aali, Nawal Ait ;
Idrissi, Younes El Bouzekri E. ;
Sebai, Bechir ;
Faroukhi, Abou Zakaria ;
Mahouachi, Dorra .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2024, 4 (04) :853-908
[7]   Write plus Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization [J].
Chen, Congcong ;
Cui, Jinhua ;
Qu, Gang ;
Zhang, Jiliang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :8066-8078
[8]  
Choubisa M., 2022, 2022 INT C IOT BLOCK, P1, DOI DOI 10.1109/ICIBT52874.2022.9807766
[9]   OutCenTR: A Method for Predicting Exploits of Cyber Vulnerabilities in High Dimensional Datasets [J].
Eskandari, Hadi ;
Bewong, Michael ;
Rahman, Md Geaur ;
Rehman, Sabih Ur .
IEEE ACCESS, 2024, 12 :133030-133044
[10]  
Faroukhi A. Z., 2020, 2020 IEEE 2 INT C EL, P1, DOI [10.1109/ICECOCS50124.2020.9314391, DOI 10.1109/ICECOCS50124.2020.9314391]