Risk assessment of vulnerabilities exploitation

M. Fátima Brilhante*, Pedro Pestana, M. Luísa Rocha, Fernando Sequeira

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Using the Kolmogorov–Smirnov, Cramér–von Mises and Anderson–Darling tests, and the not so commonly applied Vuong’s test, it is shown that a two components hyperlog-logistic distribution, i.e., a mixture of two geo-max-stable log-logistic distributions, provides a good fit for the time from disclosure to update of vulnerabilities sampled from the CVEdetails.com database. It is also shown that the hyperlog-logistic distribution provides a better fit than a heavy-tailed distribution of maxima, or a log-logistic distribution, or even a heavy-tailed two components hyperexponential distribution. Moreover, ways of incorporating uncertainty and of modeling vulnerabilities lifecycle into the Common Vulnerabilities Scoring System (CVSS), the most widely used score to assess severity of vulnerabilities, are discussed, in order to obtain an improved CVSS calculator and the evolution of a score over time.

Original languageEnglish
Title of host publicationNew frontiers in statistics and data science
Subtitle of host publicationSPE2023
EditorsLígia Henriques-Rodrigues, Raquel Menezes, Luís Meira Machado, Susana Faria, Miguel de Carvalho
PublisherSpringer
Pages69-82
Number of pages14
Edition1
ISBN (Electronic)9783031689499
ISBN (Print)9783031689482, 9783031726071
DOIs
Publication statusPublished - Jan 2025
Event26th Congress of the Portuguese Statistical Society, SPE 2023 - Evora, Portugal
Duration: 13 Oct 202116 Oct 2021

Publication series

NameSpringer Proceedings in Mathematics and Statistics
ISSN (Print)2194-1009
ISSN (Electronic)2194-1017

Conference

Conference26th Congress of the Portuguese Statistical Society, SPE 2023
Country/TerritoryPortugal
CityEvora
Period13/10/2116/10/21

Keywords

  • CVSS modifier
  • Heavy-tailed distributions
  • Hyperlog-logistic distribution
  • Vulnerabilities
  • Vulnerabilities lifecycle

Fingerprint

Dive into the research topics of 'Risk assessment of vulnerabilities exploitation'. Together they form a unique fingerprint.

Cite this