Modeling the vulnerability discovery process

被引:58
|
作者
Alhazmi, O. H. [1 ]
Malaiya, Y. K. [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ISSRE.2005.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security vulnerabilities in servers and operating systems are software defects that represent great risks. Both software developers and users are struggling to contain the risk posed by these vulnerabilities. The vulnerabilities are discovered by both developers and external testers throughout the life-span of a software system. A few models for the vulnerability discovery process have just been published recently. Such models will allow effective resource allocation for patch development and are also needed for evaluating the risk of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models are examined both analytically and using actual data on vulnerabilities discovered in three widely-used systems. The applicability of the proposed models and significance of the parameters involved are discussed The limitations of the proposed models are examined and major research challenges are identified
引用
收藏
页码:129 / 138
页数:10
相关论文
共 50 条
  • [21] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [22] Featherweight assisted vulnerability discovery
    Binkley, David
    Moonen, Leon
    Isaacman, Sibren
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 146
  • [23] A Survey on IoT Vulnerability Discovery
    Ban, Xinbo
    Ding, Ming
    Liu, Shigang
    Chen, Chao
    Zhang, Jun
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 267 - 282
  • [24] User-process-based modeling method for knowledge discovery
    Huazhong Ligong Daxue Xuebao, 1 (9-11):
  • [25] Causal Nets: A Modeling Language Tailored towards Process Discovery
    van der Aalst, Wil
    Adriansyah, Arya
    van Dongen, Boudewijn
    CONCUR 2011: CONCURRENCY THEORY, 2011, 6901 : 28 - 42
  • [26] Modeling of Distributed visual Knowledge Discovery from Data Process
    Ellouzi, Hamdi
    ben Ayed, Mounir
    Ltifi, Hela
    2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
  • [27] Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
    Rahimi, Sanaz
    Zargham, Mehdi
    IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (02) : 395 - 407
  • [28] Coverage-based vulnerability discovery modeling to optimize disclosure time using multiattribute approach
    Kansal, Yogita
    Kapur, Parmod Kumar
    Kumar, Uday
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2019, 35 (01) : 62 - 73
  • [29] Human vulnerability to quick shallow landslides along road: fleeing process and modeling
    Zhang, S.
    Zhang, L. M.
    LANDSLIDES, 2014, 11 (06) : 1115 - 1129
  • [30] Human vulnerability to quick shallow landslides along road: fleeing process and modeling
    S. Zhang
    L. M. Zhang
    Landslides, 2014, 11 : 1115 - 1129