International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science and Information Technology | United States of America | Volume 12 Issue 10, October 2023 | Popularity: 4.6 / 10


     

Automating Vulnerability Prioritization Using Machine Learning and Financial Impact Analysis

Santosh Kumar Kande


Abstract: Vulnerability management is a vital element of cybersecurity. While many organizations depend on external data sources such as threat intelligence platforms to prioritize vulnerabilities, the potential for automation through machine learning (ML) is underutilized. This paper presents a framework that employs ML models to automate vulnerability prioritization, enhancing the relevance and timeliness of decision - making. By integrating internal asset data, threat intelligence, network communication patterns, and financial risk assessments, organizations can more efficiently prioritize vulnerabilities in real - time, reducing risk and optimizing security investments.


Keywords: Vulnerability management, Machine Learning, Financial Impact, Threat Intelligence, asset prioritization, cybersecurity


Edition: Volume 12 Issue 10, October 2023


Pages: 2206 - 2207


DOI: https://www.doi.org/10.21275/SR241004050808



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Santosh Kumar Kande, "Automating Vulnerability Prioritization Using Machine Learning and Financial Impact Analysis", International Journal of Science and Research (IJSR), Volume 12 Issue 10, October 2023, pp. 2206-2207, URL: https://www.ijsr.net/getabstract.php?paperid=SR241004050808, DOI: https://www.doi.org/10.21275/SR241004050808



Downloads: 180 | Views: 320 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science and Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 187 - 189

Wearable Forensic Traces and Security Challenges

Divya Premchandran


Downloads: 180 | Views: 378 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science and Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1296 - 1299

Quantum Computing

Shaifali Rastogi


Downloads: 177 | Views: 343 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science and Information Technology, India, Volume 9 Issue 8, August 2020

Pages: 618 - 621

Recognition of Vehicle by Number Plate by Automatic Number Plate Recognition System

Maruthi ST, Dr. Sanjay Pande MB, Bindhu K M, Divya I, Gauri N S, Megha V


Downloads: 156 | Views: 305 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science and Information Technology, United States of America, Volume 9 Issue 3, March 2020

Pages: 1177 - 1179

IT Infrastructure Business Contingency Plan

Anshuman Awasthi


Downloads: 152 | Views: 333 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science and Information Technology, China, Volume 9 Issue 3, March 2020

Pages: 519 - 528

Sparse Representation of Image with Immune Clone Algorithm based on Harmonic Wavelet Packet Dictionary

WANG Li, WANG Wei, LIU Boni


Top