【24h】

A preliminary analysis of quantifying computer security vulnerability data in 'the wild'

机译:量化“野外”计算机安全漏洞数据的初步分析

获取原文
获取原文并翻译 | 示例

摘要

A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.
机译:由计算机,网络和软件组成的系统具有一定程度的漏洞暴露,使其容易受到犯罪黑客的威胁。当前,大多数漏洞研究都使用软件供应商和国家漏洞数据库(NVD)的数据。我们提出了一条可替代的方法,通过将我们的分析基于来自运营信息安全社区的数据(即来自“野外”的漏洞数据)进行分析。在本文中,我们提出了一种漏洞数据解析算法,并对漏洞的到达和删除过程(也称为漏洞出生-死亡过程)进行了深入的单变量和多变量分析。我们发现,漏洞到达最好以对数正态分布为特征,漏洞删除最好以指数分布为特征。这些分布可以用作未来贝叶斯分析的先验概率。我们还发现,超过22%的已删除漏洞数据的率为零,并且到达漏洞数据始终大于零。最后,我们通过双变量散点图和统计观察来量化和可视化漏洞到达和删除之间的依赖关系。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号