UNCW MS Computer Science Information Systems Proceedings



Analysis of CISA’s KEV To Help Future Exploitation Defense


Tristan Freeman


Geoff Stoker (Chair)
Barry Wray
Hosam Alamleh


Abstract

Every year there are more Common Vulnerabilities and Exposures (CVE) published in the National Vulnerability Database (NVD) than the year before, yearly reports have now surpassed more than 20,000 reports a year, but the most important CVEs are the ones that are exploited. Specifically exploited CVEs are recorded by the Cybersecurity and Infrastructure Security Agency (CISA) and placed into their Known Exploited Vulnerabilities Catalog (KEV). The focus of this research is to analyze commonalities of CVEs from the KEV and the NVD and create predictions from the data spanning from 2003 to 2023. I extracted all 200,000+ CVEs from the NVD and all 1,000+ CVEs from the KEV and deleted all Common Vulnerability Scoring System (CVSS) that used only version 3 to eliminate possible outliers. Using three different approaches to predict KEV CVEs I found that it is best to predict future attacks using machine learning because we’re able to predict 80% of CVEs that could end up being part of the KEV using common variables between NVD CVEs and KEV CVEs. The findings from this capstone can help assist cybersecurity professionals in preventing attacks by telling them which CVEs need to be patched and which do not. Keywords- CVE; NVD; CISA; KEV; CVSS


Download Full PDF


Recommended Citation: Freeman T., Stoker G., Wray B., Alamleh H., (2023). Analysis of CISA’s KEV To Help Future Exploitation Defense. UNCW MS CSIS Proceedings. V. 17 , N. 18 .