Some Guidelines for Risk Assessment of Vulnerability Discovery Processes

dc.contributor.advisorCukier, Michelen_US
dc.contributor.authorMovahedi, Yazdanen_US
dc.contributor.departmentReliability Engineeringen_US
dc.contributor.publisherDigital Repository at the University of Marylanden_US
dc.contributor.publisherUniversity of Maryland (College Park, Md.)en_US
dc.date.accessioned2019-06-19T05:40:32Z
dc.date.available2019-06-19T05:40:32Z
dc.date.issued2019en_US
dc.description.abstractSoftware vulnerabilities can be defined as software faults, which can be exploited as results of security attacks. Security researchers have used data from vulnerability databases to study trends of discovery of new vulnerabilities or propose models for fitting the discovery times and for predicting when new vulnerabilities may be discovered. Estimating the discovery times for new vulnerabilities is useful both for vendors as well as the end-users as it can help with resource allocation strategies over time. Among the research conducted on vulnerability modeling, only a few studies have tried to provide a guideline about which model should be used in a given situation. In other words, assuming the vulnerability data for a software is given, the research questions are the following: Is there any feature in the vulnerability data that could be used for identifying the most appropriate models for that dataset? What models are more accurate for vulnerability discovery process modeling? Can the total number of publicly-known exploited vulnerabilities be predicted using all vulnerabilities reported for a given software? To answer these questions, we propose to characterize the vulnerability discovery process using several common software reliability/vulnerability discovery models, also known as Software Reliability Models (SRMs)/Vulnerability Discovery Models (VDMs). We plan to consider different aspects of vulnerability modeling including curve fitting and prediction. Some existing SRMs/VDMs lack accuracy in the prediction phase. To remedy the situation, three strategies are considered: (1) Finding a new approach for analyzing vulnerability data using common models. In other words, we examine the effect of data manipulation techniques (i.e. clustering, grouping) on vulnerability data, and investigate whether it leads to more accurate predictions. (2) Developing a new model that has better curve filling and prediction capabilities than current models. (3) Developing a new method to predict the total number of publicly-known exploited vulnerabilities using all vulnerabilities reported for a given software. The dissertation is intended to contribute to the science of software reliability analysis and presents some guidelines for vulnerability risk assessment that could be integrated as part of security tools, such as Security Information and Event Management (SIEM) systems.en_US
dc.identifierhttps://doi.org/10.13016/ypw6-k7ge
dc.identifier.urihttp://hdl.handle.net/1903/21940
dc.language.isoenen_US
dc.subject.pqcontrolledComputer scienceen_US
dc.subject.pquncontrolledExploited Vulnerabilitiesen_US
dc.subject.pquncontrolledGuidelineen_US
dc.subject.pquncontrolledRisk Assessmenten_US
dc.subject.pquncontrolledSoftware Vulnerabilitiesen_US
dc.subject.pquncontrolledVulnerability Analysisen_US
dc.subject.pquncontrolledVulnerability Discovery Modelsen_US
dc.titleSome Guidelines for Risk Assessment of Vulnerability Discovery Processesen_US
dc.typeDissertationen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Movahedi_umd_0117E_19840.pdf
Size:
5.78 MB
Format:
Adobe Portable Document Format