Title of article :
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
Author/Authors :
Holm، نويسنده , , Hannes and Korman، نويسنده , , Matus and Ekstedt، نويسنده , , Mathias، نويسنده ,
Issue Information :
ماهنامه با شماره پیاپی سال 2015
Pages :
15
From page :
304
To page :
318
Abstract :
AbstractContext re vulnerabilities in general, and software vulnerabilities with publicly available exploits in particular, are important to manage for both developers and users. This is however a difficult matter to address as time is limited and vulnerabilities are frequent. ive aper presents a Bayesian network based model that can be used by enterprise decision makers to estimate the likelihood that a professional penetration tester is able to obtain knowledge of critical vulnerabilities and exploits for these vulnerabilities for software under different circumstances. n the activities in the model are gathered from previous empirical studies, vulnerability databases and a survey with 58 individuals who all have been credited for the discovery of critical software vulnerabilities. s oposed model describes 13 states related by 17 activities, and a total of 33 different datasets. sion tes by the model can be used to support decisions regarding what software to acquire, or what measures to invest in during software development projects.
Keywords :
Exploits , vulnerabilities , Security Metrics , Statistical Model , Cyber security
Journal title :
Information and Software Technology
Serial Year :
2015
Journal title :
Information and Software Technology
Record number :
2375399
Link To Document :
بازگشت