Journal of Information Security

Volume 8, Issue 2 (April 2017)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability

HTML  XML Download Download as PDF (Size: 667KB)  PP. 125-140  
DOI: 10.4236/jis.2017.82009    1,555 Downloads   3,339 Views  Citations

ABSTRACT

Obtaining complete information regarding discovered vulnerabilities looks extremely difficult. Yet, developing statistical models requires a great deal of such complete information about the vulnerabilities. In our previous studies, we introduced a new concept of “Risk Factor” of vulnerability which was calculated as a function of time. We introduced the use of Markovian approach to estimate the probability of a particular vulnerability being at a particular “state” of the vulnerability life cycle. In this study, we further develop our models, use available data sources in a probabilistic foundation to enhance the reliability and also introduce some useful new modeling strategies for vulnerability risk estimation. Finally, we present a new set of Non-Linear Statistical Models that can be used in estimating the probability of being exploited as a function of time. Our study is based on the typical security system and vulnerability data that are available. However, our methodology and system structure can be applied to a specific security system by any software engineer and using their own vulnerabilities to obtain their probability of being exploited as a function of time. This information is very important to a company’s security system in its strategic plan to monitor and improve its process for not being exploited.

Share and Cite:

Rajasooriya, S. , Tsokos, C. and Kaluarachchi, P. (2017) Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability. Journal of Information Security, 8, 125-140. doi: 10.4236/jis.2017.82009.

Cited by

[1] Collaboration or separation maximizing the partnership between a “Gray hat” hacker and an organization in a two-stage cybersecurity game
International Journal of Information …, 2022
[2] An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
Electronics, 2022
[3] Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
arXiv preprint arXiv:2207.11708, 2022
[4] Cybersecurity: Identifying the Vulnerability Intensity Function (VIF) and Vulnerability Index Indicator (VII) of a Computer Operating System
Journal of Information Security, 2022
[5] Machine Learning and Probabilistic Methods for Network Security Assessment
2022
[6] A Continuous Risk Management Approach for Cyber-Security in Industrial Control Systems
2021
[7] An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
2020
[8] A Moving Target Defense Scheme with Overhead Optimization using Partially Observable Markov Decision Processes with Absorbing States
2020
[9] Bayesian Reliability Analysis of the Power Law Process and Statistical Modeling of Computer and Network Vulnerabilities with Cybersecurity Application
2020
[10] A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
2020
[11] A MOVING TARGET DEFENSE SCHEME WITH OVERHEAD OPTIMIZATION USING PARTIALLY OBSERVABLE MARKOV DECISION PROCESSES WITH …
2020
[12] An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems.
2020
[13] Nonhomogeneous Risk Rank Analysis Method for Security Network System
2019
[14] Automated software vulnerability assessment with concept drift
2019
[15] A közigazgatás információbiztonsága: megjósolhatók az incidensek?
2019
[16] An Improved Stochastic Model for Cybersecurity Risk Assessment
2019
[17] A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System
2019
[18] Original Paper Risk Rank Analysis Method for Vulnerabilities in a Network System
Urban Studies and Public Administration, 2019
[19] An Improved Stochastic Model for Cybersecurity Risk Assessment.
2019
[20] Building trustable remote monitoring and management systems
2018
[21] The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay
2018
[22] Non-Homogeneous Stochastic Model for Cyber Security Predictions
2017
[23] Cybersecurity: Time Series Predictive Modeling of Vulnerabilities of Desktop Operating System Using Linear and Non-Linear Approach
2017
[24] Cybersecurity: Probabilistic Behavior of Vulnerability and Life Cycle
2017
[25] Servicio de detección temprana de vulnerabilidades basado en Shodan: caso de estudio ESPE-CERT

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.