Modeling Skewness in Vulnerability Discovery

被引:18
|
作者
Joh, HyunChul [1 ]
Malaiya, Yashwant K. [2 ]
机构
[1] Gwangju Inst Sci & Technol, Sch Gen Studies, Kwangju 500712, South Korea
[2] Colorado State Univ, Comp Sci Dept, Ft Collins, CO 80523 USA
关键词
data models; security; empirical studies; vulnerability discovery model (VDM); skewness;
D O I
10.1002/qre.1567
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A vulnerability discovery model attempts to model the rate at which the vulnerabilities are discovered in a software product. Recent studies have shown that the S-shaped Alhazmi-Malaiya Logistic (AML) vulnerability discovery model often fits better than other models and demonstrates superior prediction capabilities for several major software systems. However, the AML model is based on the logistic distribution, which assumes a symmetrical discovery process with a peak in the center. Hence, it can be expected that when the discovery process does not follow a symmetrical pattern, an asymmetrical distribution based discovery model might perform better. Here, the relationship between performance of S-shaped vulnerability discovery models and the skewness in target vulnerability datasets is examined. To study the possible dependence on the skew, alternative S-shaped models based on the Weibull, Beta, Gamma and Normal distributions are introduced and evaluated. The models are fitted to data from eight major software systems. The applicability of the models is examined using two separate approaches: goodness of fit test to see how well the models track the data, and prediction capability using average error and average bias measures. It is observed that an excellent goodness of fit does not necessarily result in a superior prediction capability. The results show that when the prediction capability is considered, all the right skewed datasets are represented better with the Gamma distribution-based model. The symmetrical models tend to predict better for left skewed datasets; the AML model is found to be the best among them. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1445 / 1459
页数:15
相关论文
共 50 条
  • [21] Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
    Truex, Stacey
    Liu, Ling
    Gursoy, Mehmet Emre
    Wei, Wenqi
    Yu, Lei
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 82 - 91
  • [22] Processor Vulnerability Discovery
    Lyu, Yongqiang
    Sun, Rihui
    Qu, Gang
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [23] Modeling high-risk Wilms tumors enables the discovery of therapeutic vulnerability
    Ma, Gui
    Gao, Ang
    Chen, Jiani
    Liu, Peng
    Sarda, Rakesh
    Gulliver, Jessica
    Wang, Yidan
    Joiner, Carstyn
    Hu, Mingshan
    Kim, Eui-Jun
    Yeger, Herman
    Le, Hau D.
    Chen, Xiang
    Li, Wan-Ju
    Xu, Wei
    CELL REPORTS, 2024, 5 (10):
  • [24] Modeling multivariate conditional variance skewness kurtosis
    Wang, Chun-Feng
    Zhuang, Hong-Gang
    Fang, Zhen-Ming
    Lu, Tao
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2010, 30 (02): : 324 - 331
  • [25] A semiparametric approach for joint modeling of median and skewness
    Hernando Vanegas, Luis
    Paula, Gilberto A.
    TEST, 2015, 24 (01) : 110 - 135
  • [26] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [27] A semiparametric approach for joint modeling of median and skewness
    Luis Hernando Vanegas
    Gilberto A. Paula
    TEST, 2015, 24 : 110 - 135
  • [28] Featherweight assisted vulnerability discovery
    Binkley, David
    Moonen, Leon
    Isaacman, Sibren
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 146
  • [29] A Survey on IoT Vulnerability Discovery
    Ban, Xinbo
    Ding, Ming
    Liu, Shigang
    Chen, Chao
    Zhang, Jun
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 267 - 282
  • [30] Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
    Rahimi, Sanaz
    Zargham, Mehdi
    IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (02) : 395 - 407