Prioritizing vulnerability patches in large networks

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


We consider here the question of prioritizing the patching of security vulnerabilities to prevent network attacks. Patching all vulnerable machines at once in large modern organizations is not feasible due to the large scale of their networks and the inability to halt operation during maintenance. This article explores two aspects of security maintenance: a method for prioritizing vulnerability patches, and visualization of the priorities to aid in decision making. State-of-the-art methods rank vulnerabilities by analyzing the connectivity graph or the logical attack graph and present the results in a table form, a view of the organizational network with highlighted failure points, or even the complete attack graph, in either case flooding the human operator with a lot of hardly comprehensible information. We suggest a Network Topology Vulnerability Score (NTVS) which shows preferable results by ranking vulnerabilities in a planning graph — an interim data structure used by planners when analyzing logical attack graphs. We also suggest a new abstracted presentation of the network in order to ease the comprehension of NTVS scores. The principal results obtained on two real networks show that patching vulnerabilities prioritized by NTVS leads to a faster decrease in the number of available attack paths toward the critical assets. A user study with a panel of security experts shows that the proposed visualization is considerably better than current commercial tools, helping experts to both prioritize vulnerability patches, and explain their decisions to higher management and to operation teams.

Original languageEnglish
Article number116467
JournalExpert Systems with Applications
StatePublished - 1 May 2022


  • Attack graph
  • Decision support systems
  • Expert study
  • Knowledge presentation
  • Security applications
  • Visualization

ASJC Scopus subject areas

  • Engineering (all)
  • Computer Science Applications
  • Artificial Intelligence


Dive into the research topics of 'Prioritizing vulnerability patches in large networks'. Together they form a unique fingerprint.

Cite this