Modeling discovery and removal of security vulnerabilities in software system using priority queueing models

被引:6
作者
Lim, Dae-Eun [1 ]
Kim, Tae-Sung [2 ]
机构
[1] Baekseok Univ, Div Business & Commerce, Cheonan, Chungnam, South Korea
[2] Chungbuk Natl Univ, Dept Management Informat Syst, Cheongju, Chungbuk, South Korea
基金
新加坡国家研究基金会;
关键词
Security of data;
D O I
10.1007/s11416-014-0205-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper aims to model the discovery and removal of software vulnerabilities based on queueing theory. The probabilistic characteristics of the arrival and service processes are the core elements of queueing theory. Discovering and removing software vulnerabilities corresponds arrival and service processes in queueing models, respectively. Vulnerabilities can be classified into groups depending upon its severity levels measured by CVSS (common vulnerability scoring system). Groups with higher severity levels are fixed more quickly than groups with lower severity levels. Priority queueing models can be used and give various performance indices: the number of unfixed vulnerabilities at arbitrary instances and waiting time before getting fixed. Moreover, the service rate to prevent the number or accumulated degree of vulnerabilities from exceeding the predetermined level can be estimated.
引用
收藏
页码:109 / 114
页数:6
相关论文
共 20 条
[1]  
AIAA/ANSI, 1993, R0131992 AIAAANSI
[2]   Modeling the vulnerability discovery process [J].
Alhazmi, O. H. ;
Malaiya, Y. K. .
16TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2005, :129-138
[3]   Quantitative vulnerability assessment of systems software [J].
Alhazmi, OH ;
Malaiya, YK .
ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2005 PROCEEDINGS, 2005, :615-620
[4]  
Anderson R., 2002, C OP SOURC SOFTW EC, P1
[5]  
FIRST, CVSS HIST
[6]  
FIRST, CVSS GUID
[7]   Static vulnerability detection in Java']Java service-oriented components [J].
Goichon, Francois ;
Salagnac, Guillaume ;
Parrend, Pierre ;
Frenot, Stephane .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (01) :15-26
[8]   Software reliability analysis and measurement using finite and infinite server queueing models [J].
Huang, Chin-Yu ;
Huang, Wei-Chih .
IEEE TRANSACTIONS ON RELIABILITY, 2008, 57 (01) :192-203
[9]  
Joh H, 2011, THESIS
[10]  
Krsul I. V., 1998, THESIS