ESASCF: Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance

07/20/2023
by   Mohamed C. Ghanem, et al.
0

The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Security Compliance (SC) methods to identify security gaps and anticipate security breaches. In the computer networks context and despite the use of autonomous tools and systems, security compliance remains highly repetitive and resources consuming. In this paper, we proposed a novel method to tackle the ever-growing problem of efficiency and effectiveness in network infrastructures security auditing by formally introducing, designing, and developing an Expert-System Automated Security Compliance Framework (ESASCF) that enables industrial and open-source VA and PT tools and systems to extract, process, store and re-use the expertise in a human-expert way to allow direct application in similar scenarios or during the periodic re-testing. The implemented model was then integrated within the ESASCF and tested on different size networks and proved efficient in terms of time-efficiency and testing effectiveness allowing ESASCF to take over autonomously the SC in Re-testing and offloading Expert by automating repeated segments SC and thus enabling Experts to prioritize important tasks in Ad-Hoc compliance tests. The obtained results validate the performance enhancement notably by cutting the time required for an expert to 50 first SC and 20 addition, the framework allows a long-term impact illustrated in the knowledge extraction, generalization, and re-utilization, which enables better SC confidence independent of the human expert skills, coverage, and wrong decisions resulting in impactful false negatives.

READ FULL TEXT

page 1

page 5

page 9

page 10

page 11

page 13

page 14

research
08/09/2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

As the size and complexity of software systems increase, the number and ...
research
11/17/2020

Continuous Open Source License Compliance

In this article we consider the role of policy and process in open sourc...
research
01/17/2023

SECOMlint: A linter for Security Commit Messages

Transparent and efficient vulnerability and patch disclosure are still a...
research
03/18/2019

An Adversarial Risk Analysis Framework for Cybersecurity

Cyber threats affect all kinds of organisations. Risk analysis is an ess...
research
06/19/2021

Cyber Security in Cloud: Risk Assessment Models

The present paper shows a proposal of the characteristics Cloud Risk Ass...
research
08/18/2019

Agent-based (BDI) modeling for automation of penetration testing

Penetration testing (or pentesting) is one of the widely used and import...

Please sign up or login with your details

Forgot password? Click here to reset