Citation: Reyes, J.; Fuertes, W.;
Arévalo, P.; Macas, M. An
Environment-Specific Prioritization
Model for Information-Security
Vulnerabilities Based on Risk Factor
Analysis. Electronics 2022, 11, 1334.
https://doi.org/10.3390/
electronics11091334
Academic Editors: Leandros
Maglaras, Helge Janicke and
Mohamed Amine Ferrag
Received: 31 December 2021
Accepted: 25 March 2022
Published: 22 April 2022
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2022 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
electronics
Article
An Environment-Specific Prioritization Model for
Information-Security Vulnerabilities Based on Risk
Factor Analysis
Jorge Reyes
1,
* , Walter Fuertes
1
, Paco Arévalo
2
and Mayra Macas
1,3
1
Department of Computer Sciences, Universidad de las Fuerzas Armadas ESPE, Av. General Rumiñahui S/N,
Sangolqui P.O. Box 17-15-231B, Ecuador; wmfuertes@espe.edu.ec (W.F.); mayramacas@ieee.org (M.M.)
2
Department of Mathematics, Universidad Tecnológica Equinoccial, Rumipamba y Bourgeois,
Quito 170147, Ecuador; paco.arevalo@ute.edu.ec
3
College of Computer Science and Technology, Zhejiang University, No. 38 Zheda Road,
Hangzhou 310027, China
* Correspondence: jlreyes5@espe.edu.ec
Abstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful
exploitation compromises the integrity and availability of systems. The use of specialized tools
facilitates the vulnerability monitoring and scanning process. However, the large amount of infor-
mation transmitted over the network makes it difficult to prioritize the identified vulnerabilities
based on their severity and impact. This research aims to design and implement a prioritization
model for detecting vulnerabilities based on their network environment variables and characteristics.
A mathematical prioritization model was developed, which allows for calculating the risk factor
using the phases of collection, analysis, and extraction of knowledge from the open information
sources of the OSINT framework. The input data were obtained through the Shodan REST API. Then,
the mathematical model was applied to the relevant information on vulnerabilities and their envi-
ronment to quantify and calculate the risk factor. Additionally, a software prototype was designed
and implemented that automates the prioritization process through a Client–Server architecture
incorporating data extraction, correlation, and calculation modules. The results show that prioriti-
zation of vulnerabilities was achieved with the information available to the attacker, which allows
evaluating the overexposure of information from organizations. Finally, we concluded that Shodan
has relevant variables that assess and quantify the overexposure of an organization’s data. In addition,
we determined that the Common Vulnerability Scoring System (CVSS) is not sufficient to prioritize
software vulnerabilities since the environments where they reside have different characteristics.
Keywords: prioritization model; probability theory; risk factor; Shodan; vulnerability scanning;
vulnerability detection
1. Introduction
The significant technological advance and the constant use of applications on the
network increase the number of vulnerabilities that cybercriminals exploit daily. Fixing
vulnerabilities requires a lot of effort, time, and resources [1,2]. The cybersecurity analysts
in the CERT/CSIRT of the different organizations have an arduous task at the level of
proactive services whose main objective is to prevent attacks before they happen [3]. Those
responsible for security must also analyze what vulnerabilities affect IT assets. In this
process, they generally face an overwhelming volume of openness, which represents a
high complexity when they have several assets connected to different networks. Resource
limitations prevent mitigating all but a small number of vulnerabilities in an enterprise
network [4–6].
A wide variety of tools help in the vulnerability scanning and detection process [7,8].
Most of the results from these tools are the Common Vulnerabilities and Exposures (CVE)
Electronics 2022, 11, 1334. https://doi.org/10.3390/electronics11091334 https://www.mdpi.com/journal/electronics