Periodicity in software vulnerability discovery, patching and exploitation

被引:0
|
作者
HyunChul Joh
Yashwant K. Malaiya
机构
[1] Kyungil University,Department of Computer Engineering
[2] Colorado State University,Computer Science Department
关键词
Vulnerability; Laws of vulnerabilities; Seasonality; Periodicity; Operating system;
D O I
暂无
中图分类号
学科分类号
摘要
Periodicity in key processes related to software vulnerabilities need to be taken into account for assessing security at a given time. Here, we examine the actual multi-year field datasets for some of the most used software systems (operating systems and Web-related software) for potential annual variations in vulnerability discovery processes. We also examine weekly periodicity in the patching and exploitation of the vulnerabilities. Accurate projections of the vulnerability discovery process are required to optimally allocate the effort needed to develop patches for handling discovered vulnerabilities. A time series analysis that combines the periodic pattern and longer-term trends allows the developers to predict future needs more accurately. We analyze eighteen datasets of software systems for annual seasonality in their vulnerability discovery processes. This analysis shows that there are indeed repetitive annual patterns. Next, some of the datasets from a large number of major organizations that record the result of daily scans are examined for potential weekly periodicity and its statistical significance. The results show a 7-day periodicity in the presence of unpatched vulnerabilities, as well as in the exploitation pattern. The seasonal index approach is used to examine the statistical significance of the observed periodicity. The autocorrelation function is used to identify the exact periodicity. The results show that periodicity needs to be considered for optimal resource allocations and for evaluation of security risks.
引用
收藏
页码:673 / 690
页数:17
相关论文
共 50 条
  • [1] Periodicity in software vulnerability discovery, patching and exploitation
    Joh, HyunChul
    Malaiya, Yashwant K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 673 - 690
  • [2] Modeling Vulnerability Discovery and Patching with Fixing Lag
    Shrivastava, A. K.
    Sharma, Ruchi
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 569 - 578
  • [3] Patching Power System Software Vulnerability Using CNNVD
    Wu, Qin-qin
    Wei, Li-hao
    Liang, Zhi-qiang
    Yu, Zhi-wen
    Chen, Min
    Chen, Zhi-hua
    Tan, Jin-jun
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND MECHATRONICS ENGINEERING (CCME 2018), 2018, 332 : 356 - 360
  • [4] Survey of Automatic Software Vulnerability Exploitation
    Wu, Zehui
    Wei, Qiang
    Wang, Xinlei
    Wang, Yunchao
    Yan, Chenyu
    Chen, Jing
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (09): : 2261 - 2274
  • [5] Automated Vulnerability Discovery and Exploitation in the Internet of Things
    Wang, Zhongru
    Zhang, Yuntao
    Tian, Zhihong
    Ruan, Qiang
    Liu, Tong
    Wang, Haichen
    Liu, Zhehui
    Lin, Jiayi
    Fang, Binxing
    Shi, Wei
    SENSORS, 2019, 19 (15)
  • [6] CloudER: A Framework for Automatic Software Vulnerability Location and Patching in the Cloud
    Chen, Ping
    Xu, Dongyan
    Mao, Bing
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [7] User Based Fault Detection, Vulnerability Discovery and Patching: An Interdisciplinary Research
    Kapur, P. K.
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 27 - 33
  • [8] Symbolic Execution vs. Search for Software Vulnerability Detection and Patching
    Roychoudhury, Abhik
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348
  • [9] Survey of Software Vulnerability Discovery Technology
    Wang, Wei
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK, COMMUNICATION AND EDUCATION (SNCE 2017), 2017, 82 : 9 - 13
  • [10] Software Vulnerability Discovery Techniques: A Survey
    Liu, Bingchang
    Shi, Liang
    Cai, Zhuhua
    Li, Min
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 152 - 156