Modeling Skewness in Vulnerability Discovery

被引:18
|
作者
Joh, HyunChul [1 ]
Malaiya, Yashwant K. [2 ]
机构
[1] Gwangju Inst Sci & Technol, Sch Gen Studies, Kwangju 500712, South Korea
[2] Colorado State Univ, Comp Sci Dept, Ft Collins, CO 80523 USA
关键词
data models; security; empirical studies; vulnerability discovery model (VDM); skewness;
D O I
10.1002/qre.1567
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A vulnerability discovery model attempts to model the rate at which the vulnerabilities are discovered in a software product. Recent studies have shown that the S-shaped Alhazmi-Malaiya Logistic (AML) vulnerability discovery model often fits better than other models and demonstrates superior prediction capabilities for several major software systems. However, the AML model is based on the logistic distribution, which assumes a symmetrical discovery process with a peak in the center. Hence, it can be expected that when the discovery process does not follow a symmetrical pattern, an asymmetrical distribution based discovery model might perform better. Here, the relationship between performance of S-shaped vulnerability discovery models and the skewness in target vulnerability datasets is examined. To study the possible dependence on the skew, alternative S-shaped models based on the Weibull, Beta, Gamma and Normal distributions are introduced and evaluated. The models are fitted to data from eight major software systems. The applicability of the models is examined using two separate approaches: goodness of fit test to see how well the models track the data, and prediction capability using average error and average bias measures. It is observed that an excellent goodness of fit does not necessarily result in a superior prediction capability. The results show that when the prediction capability is considered, all the right skewed datasets are represented better with the Gamma distribution-based model. The symmetrical models tend to predict better for left skewed datasets; the AML model is found to be the best among them. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1445 / 1459
页数:15
相关论文
共 50 条
  • [21] Modeling skewness with the linear stochastic plateau model to determine optimal nitrogen rates
    Boyer, Christopher N.
    Brorsen, B. Wade
    Tumusiime, Emmanuel
    AGRICULTURAL ECONOMICS, 2015, 46 (01) : 1 - 10
  • [22] Skewness in hedge funds returns: classical skewness coefficients vs Azzalini's skewness parameter
    Eling, Martin
    Farinelli, Simone
    Rossello, Damiano
    Tibiletti, Luisa
    INTERNATIONAL JOURNAL OF MANAGERIAL FINANCE, 2010, 6 (04) : 290 - +
  • [23] Search-Based Concolic Execution for SW Vulnerability Discovery
    Fayozbek, Rustamov
    Choi, Minjun
    Yun, Joobeom
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (10): : 2526 - 2529
  • [24] Fuzzing vulnerability discovery techniques: Survey, challenges and future directions
    Beaman, Craig
    Redbourne, Michael
    Mummery, J. Darren
    Hakak, Saqib
    COMPUTERS & SECURITY, 2022, 120
  • [25] Data-driven Insights from Vulnerability Discovery Metrics
    Munaiah, Nuthan
    Meneely, Andrew
    2019 IEEE/ACM JOINT 4TH INTERNATIONAL WORKSHOP ON RAPID CONTINUOUS SOFTWARE ENGINEERING AND 1ST INTERNATIONAL WORKSHOP ON DATA-DRIVEN DECISIONS, EXPERIMENTATION AND EVOLUTION (RCOSE-DDREE 2019), 2019, : 1 - 7
  • [26] Study on sensitive information leakage vulnerability modeling
    Kim, Sung-Hwan
    Kim, Nam-Uk
    Chung, Tai-Myoung
    KYBERNETES, 2015, 44 (01) : 77 - 88
  • [27] TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments
    Ghaniyoun, Moein
    Barber, Kristin
    Xiao, Yuan
    Zhang, Yinqian
    Teodorescu, Radu
    PROCEEDINGS OF THE 2023 THE 50TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, ISCA 2023, 2023, : 489 - 503
  • [28] ART4SQLi: The ART of SQL Injection Vulnerability Discovery
    Zhang, Long
    Zhang, Donghong
    Wang, Chenghong
    Zhao, Jing
    Zhang, Zhenyu
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (04) : 1470 - 1489
  • [29] Runtime vulnerability discovery as a service on Industrial Internet of Things (IIoT) systems
    Luis Flores, Jose
    Mugarza, Imanol
    2018 IEEE 23RD INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2018, : 948 - 955
  • [30] Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
    Votipka, Daniel
    Stevens, Rock
    Redmiles, Elissa M.
    Hu, Jeremy
    Mazurek, Michelle L.
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 374 - 391