Periodicity in software vulnerability discovery, patching and exploitation

被引:0
|
作者
HyunChul Joh
Yashwant K. Malaiya
机构
[1] Kyungil University,Department of Computer Engineering
[2] Colorado State University,Computer Science Department
关键词
Vulnerability; Laws of vulnerabilities; Seasonality; Periodicity; Operating system;
D O I
暂无
中图分类号
学科分类号
摘要
Periodicity in key processes related to software vulnerabilities need to be taken into account for assessing security at a given time. Here, we examine the actual multi-year field datasets for some of the most used software systems (operating systems and Web-related software) for potential annual variations in vulnerability discovery processes. We also examine weekly periodicity in the patching and exploitation of the vulnerabilities. Accurate projections of the vulnerability discovery process are required to optimally allocate the effort needed to develop patches for handling discovered vulnerabilities. A time series analysis that combines the periodic pattern and longer-term trends allows the developers to predict future needs more accurately. We analyze eighteen datasets of software systems for annual seasonality in their vulnerability discovery processes. This analysis shows that there are indeed repetitive annual patterns. Next, some of the datasets from a large number of major organizations that record the result of daily scans are examined for potential weekly periodicity and its statistical significance. The results show a 7-day periodicity in the presence of unpatched vulnerabilities, as well as in the exploitation pattern. The seasonal index approach is used to examine the statistical significance of the observed periodicity. The autocorrelation function is used to identify the exact periodicity. The results show that periodicity needs to be considered for optimal resource allocations and for evaluation of security risks.
引用
收藏
页码:673 / 690
页数:17
相关论文
共 50 条
  • [41] Prediction of Future Vulnerability Discovery in Software Applications using Vulnerability Syntax Tree (PFVD-VST)
    Periyasamy, Kola
    Arirangan, Saranya
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 288 - 294
  • [42] Optimal Software Patching Plan for PMUs
    Tesfay, Teklemariam Tsegay
    Le Boudec, Jean-Yves
    Svensson, Ola
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) : 6500 - 6510
  • [43] Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
    Fulton, Kelsey R.
    Katcher, Samantha
    Song, Kevin
    Chetty, Marshini
    Mazurek, Michelle L.
    Messdaghi, Chloe
    Votipka, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1997 - 2014
  • [44] Exploitation, Vulnerability, and Social Domination
    Vrousalis, Nicholas
    PHILOSOPHY & PUBLIC AFFAIRS, 2013, 41 (02) : 131 - 157
  • [45] The vulnerability of reef fishes to exploitation
    Sadovy, Yvonne
    FISHERIES SCIENCE, 2002, 68 : 135 - 138
  • [46] Exploitation of Security Vulnerability on Retirement
    Xu, Ke
    Tang, Ming
    Wang, Quancheng
    Wang, Han
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, 2024, : 1 - 14
  • [47] VULNERABILITY AND EXPLOITATION IN A GLOBALIZED WORLD
    Mitra, Agomoni Ganguli
    Biller-Andorno, Nikola
    INTERNATIONAL JOURNAL OF FEMINIST APPROACHES TO BIOETHICS, 2013, 6 (01): : 91 - 102
  • [48] Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery
    Yin, Jiao
    Tang, MingJian
    Cao, Jinli
    You, Mingshan
    Wang, Hua
    Alazab, Mamoun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5593 - 5601
  • [49] Static program analysis assisted dynamic taint tracking for software vulnerability discovery
    Zhang, Ruoyu
    Huang, Shiqiu
    Qi, Zhengwei
    Guan, Haibing
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 469 - 480
  • [50] The Heavy Tails of Vulnerability Exploitation
    Allodi, Luca
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 133 - 148