Modeling Skewness in Vulnerability Discovery

被引:18
|
作者
Joh, HyunChul [1 ]
Malaiya, Yashwant K. [2 ]
机构
[1] Gwangju Inst Sci & Technol, Sch Gen Studies, Kwangju 500712, South Korea
[2] Colorado State Univ, Comp Sci Dept, Ft Collins, CO 80523 USA
关键词
data models; security; empirical studies; vulnerability discovery model (VDM); skewness;
D O I
10.1002/qre.1567
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A vulnerability discovery model attempts to model the rate at which the vulnerabilities are discovered in a software product. Recent studies have shown that the S-shaped Alhazmi-Malaiya Logistic (AML) vulnerability discovery model often fits better than other models and demonstrates superior prediction capabilities for several major software systems. However, the AML model is based on the logistic distribution, which assumes a symmetrical discovery process with a peak in the center. Hence, it can be expected that when the discovery process does not follow a symmetrical pattern, an asymmetrical distribution based discovery model might perform better. Here, the relationship between performance of S-shaped vulnerability discovery models and the skewness in target vulnerability datasets is examined. To study the possible dependence on the skew, alternative S-shaped models based on the Weibull, Beta, Gamma and Normal distributions are introduced and evaluated. The models are fitted to data from eight major software systems. The applicability of the models is examined using two separate approaches: goodness of fit test to see how well the models track the data, and prediction capability using average error and average bias measures. It is observed that an excellent goodness of fit does not necessarily result in a superior prediction capability. The results show that when the prediction capability is considered, all the right skewed datasets are represented better with the Gamma distribution-based model. The symmetrical models tend to predict better for left skewed datasets; the AML model is found to be the best among them. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1445 / 1459
页数:15
相关论文
共 50 条
  • [1] Modeling vulnerability discovery process in Apache and IIS HTTP servers
    Woo, Sung-Whan
    Joh, HyunChul
    Alhazmi, Omar H.
    Malaiya, Yashwant K.
    COMPUTERS & SECURITY, 2011, 30 (01) : 50 - 62
  • [2] The role of skewness in GARCH modeling
    Fang, Libing
    Kuo, Bingshen
    Zeng, Yong
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT, 2009, : 522 - 528
  • [3] A semiparametric approach for joint modeling of median and skewness
    Hernando Vanegas, Luis
    Paula, Gilberto A.
    TEST, 2015, 24 (01) : 110 - 135
  • [4] A semiparametric approach for joint modeling of median and skewness
    Luis Hernando Vanegas
    Gilberto A. Paula
    TEST, 2015, 24 : 110 - 135
  • [5] Featherweight assisted vulnerability discovery
    Binkley, David
    Moonen, Leon
    Isaacman, Sibren
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 146
  • [6] An Independent Validation of Vulnerability Discovery Models
    Viet Hung Nguyen
    Massacci, Fabio
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [7] Vulnerability discovery modelling: A general framework
    Anand A.
    Bhatt N.
    Alhazmi O.H.
    International Journal of Information and Computer Security, 2021, 16 (1-2) : 192 - 206
  • [8] Vulnerability Patch Modeling
    Kansal, Yogita
    Kumar, Deepak
    Kapur, P. K.
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY & SAFETY ENGINEERING, 2016, 23 (06)
  • [9] Bayesian semiparametric modeling for HIV longitudinal data with censoring and skewness
    Castro, Luis M.
    Wang, Wan-Lun
    Lachos, Victor H.
    de Carvalho, Vanda Inacio
    Bayes, Cristian L.
    STATISTICAL METHODS IN MEDICAL RESEARCH, 2019, 28 (05) : 1457 - 1476
  • [10] Modeling Transaction Costs and Skewness in Portfolio: Application of Fuzzy Approach
    Yu, Jing-Rung
    Chiou, Wan-Jiun Paul
    Chang, Wei-Yuan
    Lee, Wen-Yi
    2013 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY 2013), 2013, : 397 - 401