6 CONCLUSIONS
This paper presents a model-based automated
approach to quantify the overall vulnerability score of
a company. Our developed tool, EVMAT 1) provides
a user interface to model the enterprise vulnerability
topology, 2) automatically gathers system
characteristics based on OVAL and further evaluates
software vulnerabilities installed in a computer
resource based on the vulnerability data retrieved
from NVD; 3) Rank the weaknesses of software
product to help security administrators decide the
product that fits their secure demand most and 4)
quantitatively measures the overall vulnerability of an
enterprise. The experiment of modeling a small IT
company using our tool demonstrates the potentials of
this tool.
ACKNOWLEDGEMENTS
This paper is based upon work supported by the
National Science Foundation under Grant No.
0722157 and 0941900. Any opinions, findings, and
conclusions or recommendations expressed in this
material are those of the authors and do not
necessarily reflect the views of the National Science
Foundation. The authors would like to express their
gratitude to anonymous reviewers of this paper for
their thoughtful comments and suggestions.
REFERENCES
Mell Peter and Scarfone Karen and Romanosky
Sasha.Common Vulnerability Scoring System.IEE
Security and Privary, 4(6):85-89, 2006.
OVAL, Open Vulnerability and Assessment Language.
http://oval.mitre.org/
NVD, National Vulnerability Database. http://nvd.nist.gov/
Shi, Fuqian and Xu, Hongbiao and Wang, Haining. A
Representative Management Model of Network
Security in Enterprise Informatization. Proceedings of
the 2008 International Conference on Information
Management, volume 2: 304-307, 2008
Zhang, Zonghua and Nat-Abdesselam, Farid and Lin,
Xiaodong and Ho, Pin-Han. A model-based semi-
quantitative approach for evaluating security of
enterprise networks. Proceedings of the 2008 ACM
symposium on Applied computing, 1069-1074, 2008.
Anderson, Evan and Choobineh, Joobin and Grimaila,
Michael R. An Enterprise Level Security Requirements
Specification Model. Proceedings of the Proceedings of
the 38th Annual Hawaii International Conference on
System Sciences, 186.3--, 2005
Lee, Jae Seung and Kim, Sang-Choon and Sohn, Seung
Won. A Design of the Security Evaluation System for
Decision Support in the Enterprise Network Security
Management. Proceedings of the Third International
Conference on Information Security and Cryptology,
246-260, 2001
Liao, Qi and Striegel, Aaron and Chawla, Nitesh.
Visualizing graph dynamics and similarity for enterprise
network security and management. Proceedings of the
Seventh International Symposium on Visualization for
Cyber Security, 34-45, 2010
Homer, John. A comprehensive approach to enterprise
network security management. Phd thesis, Kansas State
University, 2009
Chen, Xiuzhen and Zheng, Qinghua and Guan, Xiaohong.
An OVAL-based active vulnerability assessment system
for enterprise computer network. Information System
Frontiers, 10(5): 573-588, 2009.
Myerson, Judith M. Identifying enterprise network
vulnerabilities. Int. J. Netw. Manag., 12(3): 135-144,
2002.
Wang, Ju An and Wang, Hao and Guo, Minzhe and Zhou,
Linfeng and Camargo, Jairo. Ranking Attacks Based on
Vulnerability Analysis. Proceedings of the 2010 43rd
Hawaii International Conference on System Sciences,
1-10, 2010
Wang, Ju An and Guo, Minzhe. Vulnerability
categorization using Bayesian networks. Proceedings of
the Sixth Annual Workshop on Cyber Security and
Information Intelligence Research, 29:1—29:4, 2010.
OVAL Interpreter. http://oval.mitre.org/ language/
interpreter.html.
A complete guide to CVSS. http://www.first.org/cvss/cvss-
guide.html
CPE, Common Platform Enumeration. http://cpe.mitre.org/
SCAP, Security Content Automation Protocol.
http://scap.nist.gov/
CVE, Common Vulnerabilities and Exposures.
http://cve.mitre.org/
CWE, Common Weakness Enumeration.
http://cwe.mitre.org/
Wang, Ju An and Wang, Hao and Guo, Minzhe and Xia,
Min. Security metrics for software systems.
Proceedings of the 47th Annual Southeast Regional
Conference, 47:1—47:6, 2009
CERT, Computer Emergency Response Team at Carnegie
Mellon University’s Software Engineering Institute.
http://www.cert.org/stats/
ICEIS 2011 - 13th International Conference on Enterprise Information Systems
394