Exploiting vulnerability disclosures: Statistical framework and case study

Mingjian Tang, Mamoun Alazab, Yuxiu Luo

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

    11 Citations (Scopus)

    Abstract

    With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations regardless large or small. Forecasting models leveraging rich historical vulnerability disclosure data undoubtedly provide important insights to inform the cyber community with the anticipated risks. In this paper, we proposed a novel framework for statistically analysing long-Term vulnerability time series between January 1999 and January 2016. By utilising this sound framework, we initiated an important study on not only testing but also modelling persistent volatilities in the data. In sharp contrast to the existing models, we consider capturing both mean and conditional variance latent in the disclosure series. Through extensive empirical studies, a composite model is shown to effectively capture the sporadic nature of vulnerability time series. In addition, this paper paves the way for further study on the stochastic perspective of cyber vulnerability proliferation towards more accurate prediction models and better risk management.

    Original languageEnglish
    Title of host publicationProceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016
    Place of PublicationPiscataway, NJ
    PublisherInstitute of Electrical and Electronics Engineers (IEEE)
    Pages117-122
    Number of pages6
    ISBN (Electronic)9781509026579
    DOIs
    Publication statusPublished - 18 Oct 2016
    Event1st Cybersecurity and Cyberforensics Conference, CCC 2016 - Amman, Jordan
    Duration: 2 Aug 20164 Aug 2016

    Other

    Other1st Cybersecurity and Cyberforensics Conference, CCC 2016
    Country/TerritoryJordan
    CityAmman
    Period2/08/164/08/16

    Keywords

    • Cyber security
    • Generalised autoregressive conditional heteroskedasticity
    • Time series
    • Volatility
    • Vulnerability

    Fingerprint

    Dive into the research topics of 'Exploiting vulnerability disclosures: Statistical framework and case study'. Together they form a unique fingerprint.

    Cite this