ERIC Number: ED657478
Record Type: Non-Journal
Publication Date: 2024
Pages: 180
Abstractor: As Provided
ISBN: 979-8-3830-5774-2
ISSN: N/A
EISSN: N/A
Artificial Intelligence-Enabled Vulnerability Analysis and Management for It Infrastructure: A Computational Design Science Approach
Steven Ullman
ProQuest LLC, Ph.D. Dissertation, The University of Arizona
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and organizations. To combat these risks, cybersecurity teams routinely conduct vulnerability scans and assessments to identify, assess, prioritize, remediate, and mitigate vulnerabilities afflicting their IT assets. However, cybersecurity analysts are often inundated by the sheer volume of vulnerability data stemming from thousands of vulnerabilities across an expansive array of IT assets. Moreover, emerging vulnerabilities are publicly disclosed at an unprecedented rate, scaling to tens of thousands of vulnerabilities discovered annually. The diverse types of IT assets and massive scale of vulnerabilities create a complex vulnerability landscape that necessitates an automated approach. This dissertation comprises three essays that adopt the computational design science paradigm to create novel deep learning-based IT artifacts that enhance vulnerability analysis and management in IT infrastructure. Essay I develops a novel attention-based multi-view autoencoder to automatically identify and prioritize vulnerable IT assets in IT infrastructure. Essay II leverages neural information retrieval and contrastive self-supervised learning to develop a novel transformer that links vulnerability scans with disclosed vulnerabilities containing remediation strategies. Essay III utilizes graph contrastive learning and graph transformers to secure software deployments in IT infrastructure by replacing vulnerable software with secure alternatives. Each essay offers valuable practical implications for cybersecurity analysts, IT auditors, and application security engineers. Collectively, this dissertation contributes numerous design principles to the Information Systems (IS) knowledge base to facilitate future research. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://bibliotheek.ehb.be:2222/en-US/products/dissertations/individuals.shtml.]
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security, Computer Software, Computer System Design, Learning Processes, Automation
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://bibliotheek.ehb.be:2222/en-US/products/dissertations/individuals.shtml
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A