Artificial Intelligence-Enabled Vulnerability Analysis and Management for IT Infrastructure: A Computational Design Science Approach
dc.contributor.advisor | Chen, Hsinchun | |
dc.contributor.author | Ullman, Steven | |
dc.creator | Ullman, Steven | |
dc.date.accessioned | 2024-06-26T00:22:54Z | |
dc.date.available | 2024-06-26T00:22:54Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Ullman, Steven. (2024). Artificial Intelligence-Enabled Vulnerability Analysis and Management for IT Infrastructure: A Computational Design Science Approach (Doctoral dissertation, University of Arizona, Tucson, USA). | |
dc.identifier.uri | http://hdl.handle.net/10150/672795 | |
dc.description.abstract | Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and organizations. To combat these risks, cybersecurity teams routinely conduct vulnerability scans and assessments to identify, assess, prioritize, remediate, and mitigate vulnerabilities afflicting their IT assets. However, cybersecurity analysts are often inundated by the sheer volume of vulnerability data stemming from thousands of vulnerabilities across an expansive array of IT assets. Moreover, emerging vulnerabilities are publicly disclosed at an unprecedented rate, scaling to tens of thousands of vulnerabilities discovered annually. The diverse types of IT assets and massive scale of vulnerabilities create a complex vulnerability landscape that necessitates an automated approach.This dissertation comprises three essays that adopt the computational design science paradigm to create novel deep learning-based IT artifacts that enhance vulnerability analysis and management in IT infrastructure. Essay I develops a novel attention-based multi-view autoencoder to automatically identify and prioritize vulnerable IT assets in IT infrastructure. Essay II leverages neural information retrieval and contrastive self-supervised learning to develop a novel transformer that links vulnerability scans with disclosed vulnerabilities containing remediation strategies. Essay III utilizes graph contrastive learning and graph transformers to secure software deployments in IT infrastructure by replacing vulnerable software with secure alternatives. Each essay offers valuable practical implications for cybersecurity analysts, IT auditors, and application security engineers. Collectively, this dissertation contributes numerous design principles to the Information Systems (IS) knowledge base to facilitate future research. | |
dc.language.iso | en | |
dc.publisher | The University of Arizona. | |
dc.rights | Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction, presentation (such as public display or performance) of protected items is prohibited except with permission of the author. | |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.subject | Artificial Intelligence | |
dc.subject | Cybersecurity | |
dc.subject | Deep Learning | |
dc.subject | Design Science | |
dc.subject | Machine Learning | |
dc.subject | Vulnerability Management | |
dc.title | Artificial Intelligence-Enabled Vulnerability Analysis and Management for IT Infrastructure: A Computational Design Science Approach | |
dc.type | Electronic Dissertation | |
dc.type | text | |
thesis.degree.grantor | University of Arizona | |
thesis.degree.level | doctoral | |
dc.contributor.committeemember | Nunamaker, Jay F., Jr. | |
dc.contributor.committeemember | Brown, Susan A. | |
thesis.degree.discipline | Graduate College | |
thesis.degree.discipline | Management Information Systems | |
thesis.degree.name | Ph.D. | |
refterms.dateFOA | 2024-06-26T00:22:54Z |