首页> 外文会议>2016 IEEE International Carnahan Conference on Security Technology >Consensus forecasting of zero-day vulnerabilities for network security
【24h】

Consensus forecasting of zero-day vulnerabilities for network security

机译:网络安全零日漏洞的共识预测

获取原文
获取原文并翻译 | 示例

摘要

Network defenders are locked in a constant race with attackers as they try to defend their networks. The defenders suffer from a huge disadvantage: they lack knowledge of the existence of zero-day vulnerabilities that have not been yet been discovered or publically disclosed, but that are still weakening the security of their networks. It would be a huge advantage to these defenders if they had some idea of where and when these vulnerabilities would appear and how severe they would be. The research presented here is directed towards producing accurate forecasts of the location and severity of zero-day vulnerabilities that will be discovered in the next 12-24 months. Forecasts of future zero-day vulnerabilities can be incorporated into Attack Surface security metrics that calculate the security posture of a network. Incorporating yet-to-be-discovered vulnerabilities into these calculations will alert network defenders to potential areas of weakness before they become a problem. In this research, three distinct forecasting model suites based on regression models and machine learning are used. These forecast model suites are applied to zero-day vulnerability discovery at the global and category (web browser, operating system, and video player) levels. Preliminary results demonstrate, as expected, that different models provide better forecasts at different times, but that it is difficult to predict which models will perform better under which circumstances. Therefore, the outputs of the forecast models are combined using consensus models based on Quantile Regression Averaging (QRA) and other techniques. These consensus models are expected to perform better than most individual forecast models over time, and experimental results demonstrate the strength of these consensus models. It is also important to understand the margin of error in these forecasts. QRA and other methods generate 68% and 95% confidence bounds around the forecasts, which give network defenders an idea of the best- and worst-case scenarios for which they should prepare. Experimental results generated by the consensus models demonstrate the strength of the forecasts and the confidence bounds. The results make a strong case for continuing this work by applying it to individual software applications.
机译:当网络防御者试图捍卫自己的网络时,它们就与攻击者处于不断的竞争中。防御者遭受了巨大的不利影响:他们缺乏关于零日漏洞的知识,这些漏洞尚未被发现或公开披露,但仍在削弱其网络的安全性。如果这些防御者对这些漏洞的出现时间和地点以及严重程度有所了解,那将是一个巨大的优势。此处提供的研究旨在针对未来12-24个月内发现的零日漏洞的位置和严重程度提供准确的预测。可以将未来零日漏洞的预测合并到“攻击面”安全指标中,以计算网络的安全状况。将尚未发现的漏洞纳入这些计算中,将使网络防御者在潜在的弱点成为问题之前就发出警报。在这项研究中,使用了基于回归模型和机器学习的三个不同的预测模型套件。这些预测模型套件适用于全局和类别(Web浏览器,操作系统和视频播放器)级别的零日漏洞发现。初步结果表明,正如预期的那样,不同的模型在不同的时间提供了更好的预测,但是很难预测哪种模型在哪种情况下会表现更好。因此,使用基于分位数回归平均(QRA)和其他技术的共识模型将预测模型的输出进行组合。随着时间的推移,预计这些共识模型的性能将优于大多数单个预测模型,并且实验结果证明了这些共识模型的优势。了解这些预测中的误差幅度也很重要。 QRA和其他方法会在预测周围产生68%和95%的置信区间,这使网络防御者可以了解应准备的最佳和最坏情况。共识模型生成的实验结果证明了预测的强度和置信区间。通过将其应用于各个软件应用程序,结果为继续进行这项工作提供了有力的证明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号