A Multi-layer Tree Model for Enterprise Vulnerability Management

  • Conducting enterprise-wide vulnerability assessment (VA) on a regular basis plays an important role in assessing an enterprise’s information system security status. However, an enterprise network is always very complex, separated into different types of zones, and consisting hundreds of hosts in the networks. The complexity of IT system makes VA an extremely time-consuming task for security professionals. They are seeking for an automated tool that helps monitor and manage the overall vulnerability of an enterprise. This paper presents a novel methodology that provides a dashboard solution for managing enterprise level vulnerability. In our methodology, we develop a multi-layer tree based model to describe enterprise vulnerability topology. Then we apply a client/server structure to gather vulnerability information from enterprise resources automatically. Finally a set of well-defined metric formulas is applied to produce a normalized vulnerability score for the whole enterprise.

  • SIGITE 2011

    United States , New York·October 19 - 22, 2011

    The 12th Annual Conference on Information Technology Education will be held at the historic Thayer Hotel, on the grounds of the US Military Academy in West Point, New York.

    register for the event 

  • Latest Tweets


    : 6627 days ago

    Join the conversation
  • Conference sponsors


    • C-EMC-no-tag_blue_CMYK
    • na_logo_hrz_2c_cmyk