Vulnerability survival analysis: A novel approach to vulnerability management

被引:0
作者
Farris, Katheryn A. [1 ]
Sullivan, John [1 ]
Cybenko, George [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, 14 Engn Dr, Hanover, NH 03755 USA
来源
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY, DEFENSE, AND LAW ENFORCEMENT APPLICATIONS XVI | 2017年 / 10184卷
关键词
Vulnerability; Common Vulnerability Severity Score (CVSS); survival analysis; Kaplan-Meier probability curves; Cox proportional hazards regression model;
D O I
10.1117/12.2266378
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.
引用
收藏
页数:14
相关论文
共 13 条
  • [1] Control charting methods for autocorrelated cyber vulnerability data
    Afful-Dadzie, Anthony
    Allen, Theodore T.
    [J]. QUALITY ENGINEERING, 2016, 28 (03) : 313 - 325
  • [2] Data-Driven Cyber-Vulnerability Maintenance Policies
    Afful-Dadzie, Anthony
    Allen, Theodore T.
    [J]. JOURNAL OF QUALITY TECHNOLOGY, 2014, 46 (03) : 234 - 250
  • [3] Comparing Vulnerability Severity and Exploits Using Case-Control Studies
    Allodi, Luca
    Massacci, Fabio
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
  • [4] Bull K, 1997, STAT MED, V16, P1041
  • [5] Security patch management: Share the burden or share the damage?
    Cavusoglu, Hasan
    Cavusoglu, Huseyin
    Zhang, Jun
    [J]. MANAGEMENT SCIENCE, 2008, 54 (04) : 657 - 670
  • [6] Dempsey K.L., 2011, Information security continuous monitoring (ISCM) for federal information systems and organizations
  • [7] Doupe Adam, 2012, P 21 USENIX SEC S US, P523
  • [8] Harrell FE, 2015, SPRINGER SER STAT, DOI 10.1007/978-3-319-19425-7
  • [9] Holm Hannes, 2011, Information Management & Computer Security, V19, P231, DOI 10.1108/09685221111173058
  • [10] Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks
    Holm, Hannes
    Ekstedt, Mathias
    Andersson, Dennis
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 825 - 837