Periodicity in software vulnerability discovery, patching and exploitation

被引:0
|
作者
HyunChul Joh
Yashwant K. Malaiya
机构
[1] Kyungil University,Department of Computer Engineering
[2] Colorado State University,Computer Science Department
关键词
Vulnerability; Laws of vulnerabilities; Seasonality; Periodicity; Operating system;
D O I
暂无
中图分类号
学科分类号
摘要
Periodicity in key processes related to software vulnerabilities need to be taken into account for assessing security at a given time. Here, we examine the actual multi-year field datasets for some of the most used software systems (operating systems and Web-related software) for potential annual variations in vulnerability discovery processes. We also examine weekly periodicity in the patching and exploitation of the vulnerabilities. Accurate projections of the vulnerability discovery process are required to optimally allocate the effort needed to develop patches for handling discovered vulnerabilities. A time series analysis that combines the periodic pattern and longer-term trends allows the developers to predict future needs more accurately. We analyze eighteen datasets of software systems for annual seasonality in their vulnerability discovery processes. This analysis shows that there are indeed repetitive annual patterns. Next, some of the datasets from a large number of major organizations that record the result of daily scans are examined for potential weekly periodicity and its statistical significance. The results show a 7-day periodicity in the presence of unpatched vulnerabilities, as well as in the exploitation pattern. The seasonal index approach is used to examine the statistical significance of the observed periodicity. The autocorrelation function is used to identify the exact periodicity. The results show that periodicity needs to be considered for optimal resource allocations and for evaluation of security risks.
引用
收藏
页码:673 / 690
页数:17
相关论文
共 50 条
  • [31] Dynamic patching of embedded software
    Ekman, Mathias
    Thane, Henrik
    RTAS 2007: 13TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2007, : 337 - +
  • [32] Exploitation and the Vulnerability Clause
    Hallie Liberto
    Ethical Theory and Moral Practice, 2014, 17 : 619 - 629
  • [33] Exploitation and the Vulnerability Clause
    Liberto, Hallie
    ETHICAL THEORY AND MORAL PRACTICE, 2014, 17 (04) : 619 - 629
  • [34] Patching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release
    Choudhary, Vidyanand
    Zhang, Zhe
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (04) : 845 - 858
  • [35] Vulnerability Discovery Model for a Software System Using Stochastic Differential Equation
    Shrivastava, A. K.
    Sharma, Ruchi
    Kapur, P. K.
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 199 - 205
  • [36] Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
    Votipka, Daniel
    Stevens, Rock
    Redmiles, Elissa M.
    Hu, Jeremy
    Mazurek, Michelle L.
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 374 - 391
  • [37] Automatic Software Vulnerability Discovery and Exploit Under the Limited Resource Conditions
    Huang H.
    Wang J.
    Yang Y.
    Su P.
    Nie C.
    Xin W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2299 - 2314
  • [38] Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey
    Zeng, Peng
    Lin, Guanjun
    Pan, Lei
    Tai, Yonghang
    Zhang, Jun
    IEEE ACCESS, 2020, 8 : 197158 - 197172
  • [39] A Comparative Study of Vulnerability Discovery Modeling and Software Reliability Growth Modeling
    Kapur, P. K.
    Yadavali, V. S. S.
    Shrivastava, A. K.
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 246 - 251
  • [40] Automatically Patching Errors in Deployed Software
    Perkins, Jeff H.
    Kim, Sunghun
    Larsen, Sam
    Amarasinghe, Saman
    Bachrach, Jonathan
    Carbin, Michael
    Pacheco, Carlos
    Sherwood, Frank
    Sidiroglou, Stelios
    Sullivan, Greg
    Wong, Weng-Fai
    Zibin, Yoav
    Ernst, Michael D.
    Rinard, Martin
    SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2009, : 87 - 102