Downloads: 1 | Views: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science and Information Technology | United States of America | Volume 12 Issue 10, October 2023 | Popularity: 4.6 / 10
Automating Vulnerability Prioritization Using Machine Learning and Financial Impact Analysis
Santosh Kumar Kande
Abstract: Vulnerability management is a vital element of cybersecurity. While many organizations depend on external data sources such as threat intelligence platforms to prioritize vulnerabilities, the potential for automation through machine learning (ML) is underutilized. This paper presents a framework that employs ML models to automate vulnerability prioritization, enhancing the relevance and timeliness of decision - making. By integrating internal asset data, threat intelligence, network communication patterns, and financial risk assessments, organizations can more efficiently prioritize vulnerabilities in real - time, reducing risk and optimizing security investments.
Keywords: Vulnerability management, Machine Learning, Financial Impact, Threat Intelligence, asset prioritization, cybersecurity
Edition: Volume 12 Issue 10, October 2023
Pages: 2206 - 2207
DOI: https://www.doi.org/10.21275/SR241004050808
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 180 | Views: 320 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 187 - 189Wearable Forensic Traces and Security Challenges
Divya Premchandran
Downloads: 180 | Views: 378 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1296 - 1299Quantum Computing
Shaifali Rastogi
Downloads: 177 | Views: 343 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, India, Volume 9 Issue 8, August 2020
Pages: 618 - 621Recognition of Vehicle by Number Plate by Automatic Number Plate Recognition System
Maruthi ST, Dr. Sanjay Pande MB, Bindhu K M, Divya I, Gauri N S, Megha V
Downloads: 156 | Views: 305 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, United States of America, Volume 9 Issue 3, March 2020
Pages: 1177 - 1179IT Infrastructure Business Contingency Plan
Anshuman Awasthi
Downloads: 152 | Views: 333 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, China, Volume 9 Issue 3, March 2020
Pages: 519 - 528Sparse Representation of Image with Immune Clone Algorithm based on Harmonic Wavelet Packet Dictionary
WANG Li, WANG Wei, LIU Boni