期刊文献+

A Novel Vulnerability Prediction Model to Predict Vulnerability Loss Based on Probit Regression

A Novel Vulnerability Prediction Model to Predict Vulnerability Loss Based on Probit Regression
原文传递
导出
摘要 Software vulnerability is always an enormous threat to software security. Quantitative analysis of software vulnerabilities is necessary to the evaluation and improvement of software security. Current vulnerability prediction models mainly focus on predicting the number of vulnerabilities regardless of the seriousness of vulnerabilities, therefore these models are unable to reflect the security level of software accurately. Starting from this, we propose a vulnerability prediction model based on probit regression in this paper. Unlike traditional ones, we measure the seriousness of vulnerability by the loss it causes and aim at predicting the accumulative vulnerability loss rather than the number of vulnerabilities. To validate our model, experiment is carried out on two soft- ware -- OpenSSL and Xpdf, and the experimental result shows a good performance of our model. Software vulnerability is always an enormous threat to software security. Quantitative analysis of software vulnerabilities is necessary to the evaluation and improvement of software security. Current vulnerability prediction models mainly focus on predicting the number of vulnerabilities regardless of the seriousness of vulnerabilities, therefore these models are unable to reflect the security level of software accurately. Starting from this, we propose a vulnerability prediction model based on probit regression in this paper. Unlike traditional ones, we measure the seriousness of vulnerability by the loss it causes and aim at predicting the accumulative vulnerability loss rather than the number of vulnerabilities. To validate our model, experiment is carried out on two soft- ware -- OpenSSL and Xpdf, and the experimental result shows a good performance of our model.
出处 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第3期214-220,共7页 武汉大学学报(自然科学英文版)
基金 Supported by the Nuclear High Base Major Special(2012zx01039-004-46) the National Development and Reform Commission Information Security Special(2012-1424)
关键词 software vulnerability PREDICTION software security vulnerability loss probit regression software vulnerability prediction software security vulnerability loss probit regression
  • 相关文献

参考文献18

  • 1Nguyen V H, Tran L M S. Predicting vulnerable software components with dependency graphs [C] //Proceedings of the 6th International Workshop on Security Measurements and Metrics. New York: ACM, 2010: 3-10.
  • 2Leveson N G, Harvey P R. Analyzing soRware safety[J]. Software Engineering, IEEE Transactions on, 1983, (5): 569-579.
  • 3Huang Y F, Liu Y Z, Luo P. SSRGM: Software strong reliability growth model based on failure loss [C] // International Symposium on Parallel Architectures, Algorithms and Programming, 2012, 48(11): 255 - 261.
  • 4Liu Y Z, Luo P. Research of trustworthy software system in the network [C] // International Symposium on Parallel Archi- tectures, Algorithms and Programming. Washington D C: IEEE Computer Society, 2012, 48(11):287 - 294.
  • 5李明,郝晓玲,张嵩.公开密钥基础设施体系脆弱性及其对策分析[J].哈尔滨工业大学学报,2007,39(4):665-668. 被引量:5
  • 6Alhazmi O H, Malaiya Y K. Quantitative vulnerability assessment of systems software [C]//Proe Annual Reliability and Maintainability Symposium. Washington D C: IEEE Computer Society, 2005:615-620.
  • 7Shin Y H, Williams L. An empirical model to predict security vulnerabilities using code complexity metrics [C]// Proc of Esem'. Washington D C: IEEE Computer Society, 2008: 315-317.
  • 8Shin Y H, Williams L. Can traditional fault prediction models be used for vulnerability prediction? [J]. Empirical Software Engineering, 2013, 18(1):25 - 59.
  • 9Rahimi S, Zargham M. Vulnerability scrying method for sottware vulnerability discovery prediction without a vulnerability database refiabifity [J]. IEEE Trcest-tions on Reliability, 2013, 62(2): 395-407.
  • 10Scandariato R, Walden J, Hovsepyan A, et al. Predicting vulnerable software components via text mining [J]. IEEE Transactions on Software Engineering, 2014, 40(10): 993- 1006.

二级参考文献6

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部