Review into State of the Art of Vulnerability Assessment using Artificial Intelligence

Saad Khan, Simon Parkinson

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Vulnerability assessment is the essential and well-established process of probing security flaws, weaknesses and inadequacies in a computing infrastructure. The process helps organisations to eliminate security issues before attackers can exploit them for monetary gains or other malicious purposes. The significant advancements in desktop, Web and mobile computing technologies have widened the range of security-related complications. It has become an increasingly crucial challenge for security analysts to devise comprehensive security evaluation and mitigation tools that can protect the business-critical operations. Researchers have proposed a variety of methods for vulnerability assessment, which can be broadly categorised into manual, assistive and fully automated. Manual vulnerability assessment is performed by a human expert, based on a specific set of instructions that are aimed at finding the security vulnerability. This method requires a large amount of time, effort and resources, and it is heavily reliant on expert knowledge, something that is widely attributed to being in short supply. The assistive vulnerability assessment is conducted with the help of scanning tools or frameworks that are usually up-to-date and look for the most relevant security weakness. However, the lack of flexibility, compatibility and regular maintenance of tools, as they contain static knowledge, renders them outdated and does not provide the beneficial information (in terms of depth and scope of tests) about the state of security. Fully automated vulnerability assessment leverages artificial intelligence techniques to produce expert-like decisions without human assistance and is by far considered as the most desirable (due to time and financial reduction for the end-user) method of evaluating a systems’ security. Although being highly desirable, such techniques require additional research in improving automated knowledge acquisition, representation and learning mechanisms. Further research is also needed to develop automated vulnerability mitigation techniques that are capable of actually securing the computing platform. The volume of research being performed into the use of artificial intelligence techniques in vulnerability assessment is increasing, and there is a need to provide a survey into the state of the art.
LanguageEnglish
Title of host publicationGuide to Vulnerability Analysis for Computer Networks and Systems
Subtitle of host publicationAn Artificial Intelligence Approach
EditorsSimon Parkinson, Andrew Crampton, Richard Hill
Place of PublicationCham
PublisherSpringer, Cham
Chapter1
Pages3-32
Number of pages30
Edition1st
ISBN (Electronic)9783319926247
ISBN (Print)9783319926230
DOIs
Publication statusPublished - 9 Oct 2018

Publication series

NameComputer Communications and Networks
PublisherSpringer
ISSN (Print)1617-7975
ISSN (Electronic)2197-8433

Fingerprint

Artificial intelligence
Mobile computing
Knowledge acquisition
Security systems
Scanning
Defects
Industry

Cite this

Khan, S., & Parkinson, S. (2018). Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. In S. Parkinson, A. Crampton, & R. Hill (Eds.), Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach (1st ed., pp. 3-32). (Computer Communications and Networks). Cham: Springer, Cham. https://doi.org/10.1007/978-3-319-92624-7_1
Khan, Saad ; Parkinson, Simon. / Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. editor / Simon Parkinson ; Andrew Crampton ; Richard Hill. 1st. ed. Cham : Springer, Cham, 2018. pp. 3-32 (Computer Communications and Networks).
@inbook{83ad036ef0294e9abafeac4493380757,
title = "Review into State of the Art of Vulnerability Assessment using Artificial Intelligence",
abstract = "Vulnerability assessment is the essential and well-established process of probing security flaws, weaknesses and inadequacies in a computing infrastructure. The process helps organisations to eliminate security issues before attackers can exploit them for monetary gains or other malicious purposes. The significant advancements in desktop, Web and mobile computing technologies have widened the range of security-related complications. It has become an increasingly crucial challenge for security analysts to devise comprehensive security evaluation and mitigation tools that can protect the business-critical operations. Researchers have proposed a variety of methods for vulnerability assessment, which can be broadly categorised into manual, assistive and fully automated. Manual vulnerability assessment is performed by a human expert, based on a specific set of instructions that are aimed at finding the security vulnerability. This method requires a large amount of time, effort and resources, and it is heavily reliant on expert knowledge, something that is widely attributed to being in short supply. The assistive vulnerability assessment is conducted with the help of scanning tools or frameworks that are usually up-to-date and look for the most relevant security weakness. However, the lack of flexibility, compatibility and regular maintenance of tools, as they contain static knowledge, renders them outdated and does not provide the beneficial information (in terms of depth and scope of tests) about the state of security. Fully automated vulnerability assessment leverages artificial intelligence techniques to produce expert-like decisions without human assistance and is by far considered as the most desirable (due to time and financial reduction for the end-user) method of evaluating a systems’ security. Although being highly desirable, such techniques require additional research in improving automated knowledge acquisition, representation and learning mechanisms. Further research is also needed to develop automated vulnerability mitigation techniques that are capable of actually securing the computing platform. The volume of research being performed into the use of artificial intelligence techniques in vulnerability assessment is increasing, and there is a need to provide a survey into the state of the art.",
author = "Saad Khan and Simon Parkinson",
year = "2018",
month = "10",
day = "9",
doi = "10.1007/978-3-319-92624-7_1",
language = "English",
isbn = "9783319926230",
series = "Computer Communications and Networks",
publisher = "Springer, Cham",
pages = "3--32",
editor = "Simon Parkinson and Andrew Crampton and Richard Hill",
booktitle = "Guide to Vulnerability Analysis for Computer Networks and Systems",
edition = "1st",

}

Khan, S & Parkinson, S 2018, Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. in S Parkinson, A Crampton & R Hill (eds), Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. 1st edn, Computer Communications and Networks, Springer, Cham, Cham, pp. 3-32. https://doi.org/10.1007/978-3-319-92624-7_1

Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. / Khan, Saad; Parkinson, Simon.

Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. ed. / Simon Parkinson; Andrew Crampton; Richard Hill. 1st. ed. Cham : Springer, Cham, 2018. p. 3-32 (Computer Communications and Networks).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Review into State of the Art of Vulnerability Assessment using Artificial Intelligence

AU - Khan, Saad

AU - Parkinson, Simon

PY - 2018/10/9

Y1 - 2018/10/9

N2 - Vulnerability assessment is the essential and well-established process of probing security flaws, weaknesses and inadequacies in a computing infrastructure. The process helps organisations to eliminate security issues before attackers can exploit them for monetary gains or other malicious purposes. The significant advancements in desktop, Web and mobile computing technologies have widened the range of security-related complications. It has become an increasingly crucial challenge for security analysts to devise comprehensive security evaluation and mitigation tools that can protect the business-critical operations. Researchers have proposed a variety of methods for vulnerability assessment, which can be broadly categorised into manual, assistive and fully automated. Manual vulnerability assessment is performed by a human expert, based on a specific set of instructions that are aimed at finding the security vulnerability. This method requires a large amount of time, effort and resources, and it is heavily reliant on expert knowledge, something that is widely attributed to being in short supply. The assistive vulnerability assessment is conducted with the help of scanning tools or frameworks that are usually up-to-date and look for the most relevant security weakness. However, the lack of flexibility, compatibility and regular maintenance of tools, as they contain static knowledge, renders them outdated and does not provide the beneficial information (in terms of depth and scope of tests) about the state of security. Fully automated vulnerability assessment leverages artificial intelligence techniques to produce expert-like decisions without human assistance and is by far considered as the most desirable (due to time and financial reduction for the end-user) method of evaluating a systems’ security. Although being highly desirable, such techniques require additional research in improving automated knowledge acquisition, representation and learning mechanisms. Further research is also needed to develop automated vulnerability mitigation techniques that are capable of actually securing the computing platform. The volume of research being performed into the use of artificial intelligence techniques in vulnerability assessment is increasing, and there is a need to provide a survey into the state of the art.

AB - Vulnerability assessment is the essential and well-established process of probing security flaws, weaknesses and inadequacies in a computing infrastructure. The process helps organisations to eliminate security issues before attackers can exploit them for monetary gains or other malicious purposes. The significant advancements in desktop, Web and mobile computing technologies have widened the range of security-related complications. It has become an increasingly crucial challenge for security analysts to devise comprehensive security evaluation and mitigation tools that can protect the business-critical operations. Researchers have proposed a variety of methods for vulnerability assessment, which can be broadly categorised into manual, assistive and fully automated. Manual vulnerability assessment is performed by a human expert, based on a specific set of instructions that are aimed at finding the security vulnerability. This method requires a large amount of time, effort and resources, and it is heavily reliant on expert knowledge, something that is widely attributed to being in short supply. The assistive vulnerability assessment is conducted with the help of scanning tools or frameworks that are usually up-to-date and look for the most relevant security weakness. However, the lack of flexibility, compatibility and regular maintenance of tools, as they contain static knowledge, renders them outdated and does not provide the beneficial information (in terms of depth and scope of tests) about the state of security. Fully automated vulnerability assessment leverages artificial intelligence techniques to produce expert-like decisions without human assistance and is by far considered as the most desirable (due to time and financial reduction for the end-user) method of evaluating a systems’ security. Although being highly desirable, such techniques require additional research in improving automated knowledge acquisition, representation and learning mechanisms. Further research is also needed to develop automated vulnerability mitigation techniques that are capable of actually securing the computing platform. The volume of research being performed into the use of artificial intelligence techniques in vulnerability assessment is increasing, and there is a need to provide a survey into the state of the art.

U2 - 10.1007/978-3-319-92624-7_1

DO - 10.1007/978-3-319-92624-7_1

M3 - Chapter

SN - 9783319926230

T3 - Computer Communications and Networks

SP - 3

EP - 32

BT - Guide to Vulnerability Analysis for Computer Networks and Systems

A2 - Parkinson, Simon

A2 - Crampton, Andrew

A2 - Hill, Richard

PB - Springer, Cham

CY - Cham

ER -

Khan S, Parkinson S. Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. In Parkinson S, Crampton A, Hill R, editors, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach. 1st ed. Cham: Springer, Cham. 2018. p. 3-32. (Computer Communications and Networks). https://doi.org/10.1007/978-3-319-92624-7_1