Home > Research > Publications & Outputs > Predictive vulnerability scoring in the context...

Links

Text available via DOI:

View graph of relations

Predictive vulnerability scoring in the context of insufficient information availability

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Predictive vulnerability scoring in the context of insufficient information availability. / Ghani, H.; Luna, J.; Khelil, A. et al.
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. p. 1-8.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ghani, H, Luna, J, Khelil, A, Alkadri, N & Suri, N 2013, Predictive vulnerability scoring in the context of insufficient information availability. in 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, pp. 1-8. https://doi.org/10.1109/CRiSIS.2013.6766359

APA

Ghani, H., Luna, J., Khelil, A., Alkadri, N., & Suri, N. (2013). Predictive vulnerability scoring in the context of insufficient information availability. In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS) (pp. 1-8). IEEE. https://doi.org/10.1109/CRiSIS.2013.6766359

Vancouver

Ghani H, Luna J, Khelil A, Alkadri N, Suri N. Predictive vulnerability scoring in the context of insufficient information availability. In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE. 2013. p. 1-8 doi: 10.1109/CRiSIS.2013.6766359

Author

Ghani, H. ; Luna, J. ; Khelil, A. et al. / Predictive vulnerability scoring in the context of insufficient information availability. 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. pp. 1-8

Bibtex

@inproceedings{3b8058c2e4ae41599be0d460898e1f7f,
title = "Predictive vulnerability scoring in the context of insufficient information availability",
abstract = "Multiple databases and repositories exist for collecting known vulnerabilities for different systems and on different levels. However, it is not unusual that extensive time elapses, in some cases more than a year, in order to collect all information needed to perform/publish vulnerability scoring calculations for security management groups to assess and prioritize vulnerabilities for remediation. Scoring a vulnerability also requires broad knowledge about its characteristics, which is not always provided. As an alternative, this paper targets the quantitative understanding of security vulnerabilities in the context of insufficient vulnerability information. We propose a novel approach for the predictive assessment of security vulnerabilities, taking into consideration the relevant scenarios, e.g., zero day vulnerabilities, for which there is limited or no information to perform a typical vulnerability scoring. We propose a new analytical model, the Vulnerability Assessment Model (VAM), which is inspired by the Linear Discriminant Analysis and uses publicly available vulnerability databases such as the National Vulnerability Database (NVD) as a training data set. To demonstrate the applicability of our approach, we have developed a publicly available web application, the VAM Calculator. The experimental results obtained using real-world vulnerability data from the three most widely used Internet browsers show that by reducing the amount of required vulnerability information by around 50%, we can maintain the misclassification rate at approximately 5%. {\textcopyright} 2013 IEEE.",
keywords = "CVSS, LDA, security quantification, vulnerability assessment, Database systems, Internet, Information availability, Linear discriminant analysis, National vulnerability database, Security vulnerabilities, Vulnerability assessments, Security of data",
author = "H. Ghani and J. Luna and A. Khelil and N. Alkadri and Neeraj Suri",
year = "2013",
month = oct,
day = "23",
doi = "10.1109/CRiSIS.2013.6766359",
language = "English",
pages = "1--8",
booktitle = "2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Predictive vulnerability scoring in the context of insufficient information availability

AU - Ghani, H.

AU - Luna, J.

AU - Khelil, A.

AU - Alkadri, N.

AU - Suri, Neeraj

PY - 2013/10/23

Y1 - 2013/10/23

N2 - Multiple databases and repositories exist for collecting known vulnerabilities for different systems and on different levels. However, it is not unusual that extensive time elapses, in some cases more than a year, in order to collect all information needed to perform/publish vulnerability scoring calculations for security management groups to assess and prioritize vulnerabilities for remediation. Scoring a vulnerability also requires broad knowledge about its characteristics, which is not always provided. As an alternative, this paper targets the quantitative understanding of security vulnerabilities in the context of insufficient vulnerability information. We propose a novel approach for the predictive assessment of security vulnerabilities, taking into consideration the relevant scenarios, e.g., zero day vulnerabilities, for which there is limited or no information to perform a typical vulnerability scoring. We propose a new analytical model, the Vulnerability Assessment Model (VAM), which is inspired by the Linear Discriminant Analysis and uses publicly available vulnerability databases such as the National Vulnerability Database (NVD) as a training data set. To demonstrate the applicability of our approach, we have developed a publicly available web application, the VAM Calculator. The experimental results obtained using real-world vulnerability data from the three most widely used Internet browsers show that by reducing the amount of required vulnerability information by around 50%, we can maintain the misclassification rate at approximately 5%. © 2013 IEEE.

AB - Multiple databases and repositories exist for collecting known vulnerabilities for different systems and on different levels. However, it is not unusual that extensive time elapses, in some cases more than a year, in order to collect all information needed to perform/publish vulnerability scoring calculations for security management groups to assess and prioritize vulnerabilities for remediation. Scoring a vulnerability also requires broad knowledge about its characteristics, which is not always provided. As an alternative, this paper targets the quantitative understanding of security vulnerabilities in the context of insufficient vulnerability information. We propose a novel approach for the predictive assessment of security vulnerabilities, taking into consideration the relevant scenarios, e.g., zero day vulnerabilities, for which there is limited or no information to perform a typical vulnerability scoring. We propose a new analytical model, the Vulnerability Assessment Model (VAM), which is inspired by the Linear Discriminant Analysis and uses publicly available vulnerability databases such as the National Vulnerability Database (NVD) as a training data set. To demonstrate the applicability of our approach, we have developed a publicly available web application, the VAM Calculator. The experimental results obtained using real-world vulnerability data from the three most widely used Internet browsers show that by reducing the amount of required vulnerability information by around 50%, we can maintain the misclassification rate at approximately 5%. © 2013 IEEE.

KW - CVSS

KW - LDA

KW - security quantification

KW - vulnerability assessment

KW - Database systems

KW - Internet

KW - Information availability

KW - Linear discriminant analysis

KW - National vulnerability database

KW - Security vulnerabilities

KW - Vulnerability assessments

KW - Security of data

U2 - 10.1109/CRiSIS.2013.6766359

DO - 10.1109/CRiSIS.2013.6766359

M3 - Conference contribution/Paper

SP - 1

EP - 8

BT - 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)

PB - IEEE

ER -