Mostrar el registro sencillo del ítem

Artículo

dc.creatorVarela Vaca, Ángel Jesúses
dc.creatorBorrego Núñez, Dianaes
dc.creatorGómez López, María Teresaes
dc.creatorMartínez Gasca, Rafaeles
dc.creatorMárquez Trujillo, Antonio Germánes
dc.date.accessioned2022-10-19T08:40:55Z
dc.date.available2022-10-19T08:40:55Z
dc.date.issued2022
dc.identifier.citationVarela Vaca, Á.J., Borrego Núñez, D., Gómez López, M.T., Martínez Gasca, R. y Márquez Trujillo, A.G. (2022). Feature models to boost the vulnerability management process. Journal of Systems and Software, October 2022, art. nº111541, 1-55. https://doi.org/10.1016/j.jss.2022.111541.
dc.identifier.issn0164-1212es
dc.identifier.urihttps://hdl.handle.net/11441/138094
dc.description.abstractVulnerability management is a critical and very challenging process that allows organisations to design a procedure to identify potential vulnerabilities, assess the level of risk, and define remediation mechanisms to address threats. Thus, the large number of configuration options in systems makes it extremely difficult to identify which configurations are affected by vulnerabilities and even assess how systems may be affected. There are several repositories to store information on systems, software vulnerabilities, and exploits. However, they are largely scattered, offer different formats and information, and their use has limitations, complicating vulnerability management automation. For this reason, we introduce a discussion concerning modelling in vulnerability management and the proposal of feature models as a means to collect the variability of software and system configurations to facilitate the vulnerability management process. This paper presents AMADEUS-Exploit, a feature model-based solution that provides query and reasoning mechanisms that make it easier for vulnerability management experts. The power of AMADEUS-Exploit is shown and evaluated in three different ways: first, the solution is compared with other vulnerability management tools; second, the solution is faced with another in a complex scenario with 4,000 vulnerabilities and 700 exploits; and finally, our solution was used in a real project demonstrating the usability of reasoning operations to determine potential vulnerabilities.es
dc.description.sponsorshipJunta de Andalucía COPERNICA (P20-01224)es
dc.description.sponsorshipJunta de Andalucía METAMORFOSIS (US-1381375)es
dc.description.sponsorshipMinisterio de Ciencia e Innovación AETHER-US PID2020-112540RB-C44es
dc.formatapplication/pdfes
dc.format.extent55es
dc.language.isoenges
dc.publisherElsevieres
dc.relation.ispartofJournal of Systems and Software, October 2022, art. nº111541, 1-55.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectCybersecurityes
dc.subjectFeature modeles
dc.subjectVulnerabilityes
dc.subjectExploitses
dc.subjectReasoninges
dc.subjectVulnerable management processes
dc.titleFeature models to boost the vulnerability management processes
dc.typeinfo:eu-repo/semantics/articlees
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/acceptedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.relation.projectIDCOPERNICA (P20-01224)es
dc.relation.projectIDMETAMORFOSIS (US-1381375)es
dc.relation.projectIDAETHER-US PID2020-112540RB-C44es
dc.relation.publisherversionhttps://www.sciencedirect.com/science/article/pii/S0164121222002175?via%3Dihubes
dc.identifier.doi10.1016/j.jss.2022.111541es
dc.contributor.groupUniversidad de Sevilla. TIC-258: Data-centric Computing Research Hubes
dc.journaltitleJournal of Systems and Softwarees
dc.publication.issueOctober 2022, art. nº111541es
dc.publication.initialPage1es
dc.publication.endPage55es
dc.contributor.funderJunta de Andalucíaes
dc.contributor.funderMinisterio de Ciencia e Innovación (MICIN). Españaes

FicherosTamañoFormatoVerDescripción
Artículo Varela.pdf2.289MbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional