
security, our method addresses vulnerabilities in the
most critical attack paths, based on their exploitabil-
ity.
5.2 Non-Graph Based Prioritization
(Farris et al., 2018) proposed a vulnerability man-
agement strategy named VULCON based on perfor-
mance metrics such as time-to-vulnerability remedia-
tion and total vulnerability exposure. Their optimized
approach reduces long-term risk on the network, even
if it doesn’t fix as many vulnerabilities overall, fo-
cusing on the most dangerous ones rather than ad-
dressing the highest number. Similarly, (Jung et al.,
2022) present a context-aware vulnerability prioriti-
zation model that calculates temporal-enabled vulner-
ability scores of CVEs and visualizes them. However,
their work generally requires expert knowledge and
time to validate the detected vulnerabilities. (Wu
et al., 2022) propose an OS-aware vulnerability pri-
oritization approach that employs differential severity
analysis, utilizing techniques such as static program
analysis and natural language processing to assess the
severity of vulnerabilities for specific Linux and An-
droid systems. Lastly, PatchRank (Yadav and Paul,
2019) considers SCADA system interdependencies
and ranks nodes’ vulnerabilities using CVSS scores
and their potential impact.
Compared to all the above works, we use a
topology-aware approach combined with attack-path
selection algorithms to simulate attacker behavior.
Additionally, we leverage EPSS to rank vulnerabili-
ties based on exploitability, providing a dynamic and
up-to-date view. Our method addresses vulnerabil-
ities in distributed systems and demonstrates its ef-
fectiveness in EV charging networks, where a single
subsystem vulnerability can have cascading effects on
connected systems.
(Ma et al., 2024) introduce a new tool named Vul-
Net, which provides priority ranking for the depen-
dencies in software libraries and associated vulnera-
bilities and overcomes other platforms such as Maven
Repository (MVN) and Open Source Insights (OSI).
They rank the vulnerabilities based on severity and
dependencies based on dependency depth. However,
their research is limited only to software library de-
pendencies and not other systems, and they use the
CVSS metric score to assign severity. Moreover, they
do not discuss any attack-path selection approach.
5.3 Graph-Based Prioritization
In their work, (Olswang et al., 2022) main contri-
butions are prioritizing vulnerability patches and at-
tack graph visualization to assist in decision-making.
Their primary focus is estimating a node’s importance
within a graph. Their method is based on the number
of attacks that pass through a specific vulnerability on
a specific device. In contrast, DPM focuses on the
number of vulnerabilities in each host and the likeli-
hood of exploiting that particular vulnerability.
(Stergiopoulos et al., 2022) present a method
for automatically analyzing complex attack graphs in
multi-cloud infrastructures. Their proposed tool pri-
oritizes existing vulnerabilities, explores the effect of
system states on the overall network, and suggests
which system states, vulnerabilities, and configura-
tions have the most significant overall risk to the
ecosystem. They use Edmond’s algorithm to create
a directed tree from a root node that connects to ev-
ery node in the graph, modeling potential attack paths.
The root represents the attacker’s end goal, which dif-
fers from DPM that uses the BFS algorithm, and in
our case, the roots are entry points. We want to see
the riskiest path the attacker can take from various
nodes. Moreover, we utilize the EPSS score, which
differs from their work, which uses CVSS.
(Pirani et al., 2022) developed an attack graph
model for a network’s vulnerability and topology
that minimizes attack success likelihood with mini-
mum cost. They study connectivity measures of sev-
eral vehicle platoon topologies and reveal how these
measures affect the ability of distributed algorithms
to reject communication disturbances, detect cyber-
attacks, and be resilient against them. However, the
authors focus solely on network topologies but do not
discuss vulnerabilities. They do not address specific
weaknesses in the software, hardware, or protocols
that attackers could exploit, which limits their study’s
application in practical cybersecurity scenarios.
5.4 Attack-Path Prioritization
(Stellios et al., 2021) propose a target-oriented and
source-driven methodology to assess the attack paths
against critical assets. By extending CVSS metrics of
CVEs, they use vulnerability vectors to assess attack-
path scenarios, whereas we use EPSS, which repre-
sents updated information regarding the exploitability
of the CVEs. (Yang et al., 2023) propose a method
for the risk assessment of IoT hosts based on attack
graphs. Their approach involves generating attack
graphs and quantifying both the atomic attack prob-
ability and vulnerability impact value based on mul-
tiple vulnerability attributes. The criticality of a host,
referred to as its ”asset value,” is determined through
a method, which combines expert scoring with the
host’s role in the network topology. However, they do
VEHITS 2025 - 11th International Conference on Vehicle Technology and Intelligent Transport Systems
122