Visible to the public Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

TitleSmart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
Publication TypeConference Paper
Year of Publication2020
AuthorsUllman, Steven, Samtani, Sagar, Lazarine, Ben, Zhu, Hongyi, Ampel, Benjamin, Patton, Mark, Chen, Hsinchun
Conference Name2020 IEEE International Conference on Intelligence and Security Informatics (ISI)
Date PublishedNov. 2020
PublisherIEEE
ISBN Number978-1-7281-8800-3
Keywordscompositionality, Conferences, genomics, GitHub, graph embedding, Inspection, Memory, Metrics, pubcrawl, resilience, Resiliency, Scientific Computing Security, Scientific cyberinfrastructure, security, software development management, virtual machine, Virtual machining, vulnerability scanning
AbstractThe accelerated growth of computing technologies has provided interdisciplinary teams a platform for producing innovative research at an unprecedented speed. Advanced scientific cyberinfrastructures, in particular, provide data storage, applications, software, and other resources to facilitate the development of critical scientific discoveries. Users of these environments often rely on custom developed virtual machine (VM) images that are comprised of a diverse array of open source applications. These can include vulnerabilities undetectable by conventional vulnerability scanners. This research aims to identify the installed applications, their vulnerabilities, and how they vary across images in scientific cyberinfrastructure. We propose a novel unsupervised graph embedding framework that captures relationships between applications, as well as vulnerabilities identified on corresponding GitHub repositories. This embedding is used to cluster images with similar applications and vulnerabilities. We evaluate cluster quality using Silhouette, Calinski-Harabasz, and Davies-Bouldin indices, and application vulnerabilities through inspection of selected clusters. Results reveal that images pertaining to genomics research in our research testbed are at greater risk of high-severity shell spawning and data validation vulnerabilities.
URLhttps://ieeexplore.ieee.org/document/9280545
DOI10.1109/ISI49825.2020.9280545
Citation Keyullman_smart_2020