Please use this identifier to cite or link to this item: http://hdl.handle.net/10071/35360
Author(s): Polónio, J.
Moura, J.
Marinheiro, R. N.
Date: 2025
Title: Towards automatic detection and mitigation of high-risk cybersecurity vulnerabilities at networked systems
Journal title: IEEE Access
Volume: N/A
Reference: Polónio, J., Moura, J., & Marinheiro, R. N. (2025). Towards automatic detection and mitigation of high-risk cybersecurity vulnerabilities at networked systems. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3622497
ISSN: 2169-3536
DOI (Digital Object Identifier): 10.1109/ACCESS.2025.3622497
Keywords: System vulnerability
Detection
Risk
Mitigation
Software defined networks
Automation
Network security
Abstract: The current manuscript investigates a comprehensive security framework designed to proactively detect, classify, prioritize, and mitigate high-risk cybersecurity vulnerabilities in networked systems controlled by software-defined networking (SDN). While available literature explores various approaches, it lacks solutions that aggregate in a logically centralized and automated ways the previous referred capabilities. Orchestrating efficiently all these capabilities is crucial to continuously ensure the reliable operation of high-complexity networked systems. This article integrates in a novel way SDN with the Security Orchestration, Automation, and Response (SOAR) paradigm to automatically identify and address security vulnerabilities in network devices before they can be exploited. The proposed open-source framework leverages standardized risk indicators to rank discovered vulnerabilities and apply the most suitable mitigation strategies to mitigate the vulnerabilities with the highest risk of being explored against the system normal operation. The paper framework enhances the reactive security capabilities offered by legacy network devices such as Firewalls and Intrusion Detection Systems (IDSs). The paper details the design, implementation, and evaluation of the framework, validated through both emulation and hardware-based tests. The results confirm that the solution is effective in identifying and mitigating vulnerabilities across diverse devices. Analyzing the results obtained from scalability tests, as the number of scanned devices exceeds a certain threshold, CPU usage increases significantly, while memory and communication resources remain underutilized. In addition, after identifying high-risk device vulnerabilities, the framework automatically applies mitigation measures, timely protecting the system normal operation. Future work may improve the capabilities of the framework by using artificial intelligence for more efficient device vulnerability discovery, context-aware security risk evaluation, and better-aligned mitigation actions targeting identified high-risk security vulnerabilities.
Peerreviewed: yes
Access type: Open Access
Appears in Collections:IT-RI - Artigos em revistas científicas internacionais com arbitragem científica

Files in This Item:
File SizeFormat 
article_113233.pdf1,03 MBAdobe PDFView/Open


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.