
6  CONCLUSIONS  
This paper presents a model-based automated 
approach to quantify the overall vulnerability score of 
a company. Our developed tool, EVMAT 1) provides 
a user interface to model the enterprise vulnerability 
topology, 2) automatically gathers system 
characteristics based on OVAL and further evaluates 
software vulnerabilities installed in a computer 
resource based on the vulnerability data retrieved 
from NVD; 3) Rank the weaknesses of software 
product to help security administrators decide the 
product that fits their secure demand most and 4) 
quantitatively measures the overall vulnerability of an 
enterprise. The experiment of modeling a small IT 
company using our tool demonstrates the potentials of 
this tool. 
ACKNOWLEDGEMENTS 
This paper is based upon work supported by the 
National Science Foundation under Grant No. 
0722157 and 0941900. Any opinions, findings, and 
conclusions or recommendations expressed in this 
material are those of the authors and do not 
necessarily reflect the views of the National Science 
Foundation. The authors would like to express their 
gratitude to anonymous reviewers of this paper for 
their thoughtful comments and suggestions. 
REFERENCES 
Mell Peter and Scarfone Karen and Romanosky 
Sasha.Common Vulnerability Scoring System.IEE 
Security and Privary, 4(6):85-89, 2006. 
OVAL, Open  Vulnerability and Assessment Language. 
http://oval.mitre.org/ 
NVD, National Vulnerability Database. http://nvd.nist.gov/ 
Shi, Fuqian and Xu, Hongbiao and Wang, Haining. A 
Representative Management Model of Network 
Security in Enterprise Informatization. Proceedings of 
the 2008 International Conference on Information 
Management, volume 2: 304-307, 2008 
Zhang, Zonghua and Nat-Abdesselam, Farid and Lin, 
Xiaodong and Ho, Pin-Han. A model-based semi-
quantitative approach for evaluating security of 
enterprise networks. Proceedings of the 2008 ACM 
symposium on Applied computing, 1069-1074, 2008. 
Anderson, Evan and Choobineh, Joobin and Grimaila, 
Michael R. An Enterprise Level Security Requirements 
Specification Model. Proceedings of the Proceedings of 
the 38th Annual Hawaii International Conference on 
System Sciences, 186.3--, 2005 
Lee, Jae Seung and Kim, Sang-Choon and Sohn, Seung 
Won. A Design of the Security Evaluation System for 
Decision Support in the Enterprise Network Security 
Management.  Proceedings of the Third International 
Conference on Information Security and Cryptology, 
246-260, 2001 
Liao, Qi and Striegel, Aaron and Chawla, Nitesh. 
Visualizing graph dynamics and similarity for enterprise 
network security and management. Proceedings of the 
Seventh International Symposium on Visualization for 
Cyber Security, 34-45, 2010 
Homer, John. A comprehensive approach to enterprise 
network security management. Phd thesis, Kansas State 
University, 2009 
Chen, Xiuzhen and Zheng, Qinghua and Guan, Xiaohong. 
An OVAL-based active vulnerability assessment system 
for enterprise computer network. Information System 
Frontiers, 10(5): 573-588, 2009. 
Myerson, Judith M. Identifying enterprise network 
vulnerabilities. Int. J. Netw. Manag., 12(3): 135-144, 
2002. 
Wang, Ju An and Wang, Hao and Guo, Minzhe and Zhou, 
Linfeng and Camargo, Jairo. Ranking Attacks Based on 
Vulnerability Analysis. Proceedings of the 2010 43rd 
Hawaii International Conference on System Sciences, 
1-10, 2010 
Wang, Ju An and Guo, Minzhe. Vulnerability 
categorization using Bayesian networks. Proceedings of 
the Sixth Annual Workshop on Cyber Security and 
Information Intelligence Research, 29:1—29:4, 2010. 
OVAL Interpreter. http://oval.mitre.org/ language/ 
interpreter.html. 
A complete guide to CVSS. http://www.first.org/cvss/cvss-
guide.html 
CPE, Common Platform Enumeration. http://cpe.mitre.org/ 
SCAP, Security Content Automation Protocol. 
http://scap.nist.gov/ 
CVE, Common Vulnerabilities and Exposures. 
http://cve.mitre.org/ 
CWE, Common Weakness Enumeration. 
http://cwe.mitre.org/ 
Wang, Ju An and Wang, Hao and Guo, Minzhe and Xia, 
Min. Security metrics for software systems. 
Proceedings of the 47th Annual Southeast Regional 
Conference, 47:1—47:6, 2009 
CERT, Computer Emergency Response Team at Carnegie 
Mellon University’s Software Engineering Institute. 
http://www.cert.org/stats/ 
 
 
 
 
 
 
 
 
 
 
 
ICEIS 2011 - 13th International Conference on Enterprise Information Systems
394