43
Quantitative Vulnerability Assessment of Systems Software Omar H. Alhazmi Yashwant K. Malaiya Colorado State University

Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Quantitative Vulnerability

Assessment of Systems

Software

Omar H. Alhazmi

Yashwant K. Malaiya

Colorado State University

Page 2: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Motivation

Vulnerabilities: “defect which enables an attacker to bypass security measures” [Schultz et al: 7]

For defects: Reliability modeling and SRGMs have been around for decades.

Assuming that vulnerabilities are a special faults will lead us to this question: To what degree reliability terms and models are

applicable to vulnerabilities and security? [Littlewood et al.:14].

The need for quantitative measurements and estimation is becoming more crucial.

Page 3: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Outline of Our Goals

Developing a quantitative model to estimate

vulnerability discovery. Using calendar time.

Using equivalent effort.

Validate these measurements and models.

Testing the models using available data

Identify security Assessment metrics

Vulnerability density

Vulnerability to Total defect ratio

Page 4: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Time – vulnerability discovery model

What factors impact the discovery process?

The changing environment

The share of installed base.

Global internet users.

Discovery effort

Discoverers: Developer, White hats or black hats.

Discovery effort is proportional to the installed base over

time.

Vulnerability finders’ reward: greater rewards, higher

motivation.

Security level desired for the system

Server or client

Page 5: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Time – vulnerability discovery model

Each vulnerability is recorded.

Available [ICAT, Microsoft].

Needs compilation and filtering.

Data show three phases for an

OS.

Assumptions:

The discovery is driven by the

rewards factor.

Influenced by the change of

market share.

Time

Vuln

era

bilitie

s

Phase 2Phase 1 Phase 3

Page 6: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Time–vulnerability Discovery model

Vulnerability time growth model

Time

Vu

lnerab

ilit

ies

1ABtBCe

By

3 phase model S-shaped

model.

• Phase 1:

•Knowledge –low.

•Installed base –low.

• Phase 2:

•Knowledge – high.

•Installed base–high and

growing.

• Phase 3:

•Knowledge-high.

•Installed base–dropping.

)( yBAydt

dy

Page 7: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Windows 98

A 0.004873

B 37.7328

C 0.5543

χ2 7.365

χ2critial 60.481

P-value 1- 7.6x10-11

Time–based model: Windows 98

Windows 98

0

5

10

15

20

25

30

35

40

45

Jan-

99

Mar

-99

May

-99

Jul-9

9

Sep

-99

Nov

-99

Jan-

00

Mar

-00

May

-00

Jul-0

0

Sep

-00

Nov

-00

Jan-

01

Mar

-01

May

-01

Jul-0

1

Sep

-01

Nov

-01

Jan-

02

Mar

-02

May

-02

Jul-0

2

Sep

-02

Vuln

era

bilitie

s

Fitted curve Total vulnerabilites

Page 8: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Time–based model: Windows NT 4.0

Windows NT

4.0

A 0.000692

B 136

C 0.52288

χ2 35.584

χ2critial 103.01

P-value 0.9999973

Windows NT 4.0

0

20

40

60

80

100

120

140

160

Aug-9

6

Dec

-96

Apr-9

7

Aug-9

7

Dec

-97

Apr-9

8

Aug-9

8

Dec

-98

Apr-9

9

Aug-9

9

Dec

-99

Apr-0

0

Aug-0

0

Dec

-00

Apr-0

1

Aug-0

1

Dec

-01

Apr-0

2

Aug-0

2

Dec

-02

Apr-0

3

Vu

lne

rab

ilitie

s

Total vulnerabilities Fitted curve

Page 9: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Usage –vulnerability Discovery model

The data:

The global internet population.

The market share of the system during a period of time.

Equivalent effort

The real environment performs an intensive testing.

Malicious activities is relevant to overall activities.

Defined as )(0 i

n

i i PUE

Internet Growth

1636

70

147

248

304

359

451 458 479

513

558

569

587

608

677

682719

745

757

0

100

200

300

400

500

600

700

800

Dec

., 19

95

Dec

., 19

96

Dec

., 19

97

Dec

., 19

98

Dec

., 19

99

Mar

. 200

0

Jul.,

200

0

Dec

., 20

00

Mar

., 20

01

Jun.

, 200

1

Aug.,

2001

Apr. 2

002

Jul.,

200

2

Sep.,

2002

Mar

., 20

03

Sep.,

2003

Oct.,

2003

Dec

., 20

03

Feb.

, 200

4

May

, 200

4

Mil

lio

ns o

f u

sers

The percentage of the market share of O.S.

0

10

20

30

40

50

60

May

-99

Aug-9

9

Nov

-99

Feb-

00

May

-00

Aug-0

0

Nov

-00

Feb-

01

May

-01

Aug-0

1

Nov

-01

Feb-

02

May

-02

Aug-0

2

Nov

-02

Feb-

03

May

-03

Aug-0

3

Nov

-03

Feb-

04

May

-04

Insta

lled B

ase P

erc

enta

ge

Windows 95 Windows 98 Windows XP Windows NT Windows 2000 Others

Page 10: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Usage –vulnerability Discovery model

The model:

Exponential growth with

effort.

The basic reliability

model [Musa:21].

Time is eliminated.

0

5

10

15

20

25

30

35

40

0 750 1500 2250 3000 3750 4500 5250 6000 6750 7500

Usage (Million user's months)

Vu

lne

rab

ilitie

s

)1( vuEeBy

Page 11: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Effort-based model: Windows 98

Windows 98

B 37

λvu 0.000505

χ2 3.510

χ2critial 44.9853

P-value 1- 3.3x10-11

Windows 98

0

5

10

15

20

25

30

35

40

0 750 1500 2250 3000 3750 4500 5250 6000 6750 7500

Usage (Million user's months)

Vuln

era

bili

ties

Actual Vulnerabilities Fitted curve

Page 12: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Effort-based model: Windows NT 4.0

Win NT 4.0

B 108

λvu 0.003061

χ2 15.05

χ2critial 42.5569

P-value 0.985

Windows NT 4.0

0

20

40

60

80

100

120

010

020

030

040

050

060

070

080

090

0

1000

1100

1200

1300

1400

1500

Usage (Millions users months)

Vuln

era

bilitie

s

Actual Vulnerability Fitted

`

Page 13: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Discussion

Excellent fit for Windows 98

and NT 4.0.

Model fits data for all OSs

examined.

Deviation from the model caused by overlap: Windows 98 and Windows XP

Windows NT 4.0 and Windows 2000

Vulnerabilities in shared code may be detected in the newer OS.

Need: approach for handling such overlap

Windows 98

0

5

10

15

20

25

30

35

40

45

Jan-

99

Mar

-99

May

-99

Jul-9

9

Sep

-99

Nov

-99

Jan-

00

Mar

-00

May

-00

Jul-0

0

Sep

-00

Nov

-00

Jan-

01

Mar

-01

May

-01

Jul-0

1

Sep

-01

Nov

-01

Jan-

02

Mar

-02

May

-02

Jul-0

2

Sep

-02

Vuln

era

bili

ties

Fitted curve Total vulnerabilites

Page 14: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Vulnerability density and defect

density Defect density

Valuable metric for planning test effort

Used for setting release quality target

Limited defect density data is available

Vulnerabilities are a class of defects Vulnerability data is in the public domain.

Is vulnerability density a useful measure?

Is it related to defect density?

Vulnerabilities = 5% of defects [Longstaff: 20]?

Vulnerabilities = 1% of defects [Anderson]?

Can be a major step in measuring security.

Page 15: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Vulnerability density and defect density

Vulnerability densities: 95/98: 0.33-0.56 NT/2000: 0.63-1.8

VKD/DKD: 0.24-1.62% less than 5%

System MSLOC

Known

Defects

(1000s)

DKD

(/Kloc)

Known

Vulner -

abilies

VKD

(/Kloc)

Ratio

VKD

/DKD

Win 95 15 5 0.33 49 0.0033 0.98%

NT 4.0 16 10 0.625 162 0.0101 1.62%

Win 98 18 10 0.556 58 0.0032 0.58%

Win2000 35 63 1.8 151 0.0043 0.24%

Win XP 40 106.5* 2.66* 71 0.0018 0.067%*

* The number of defects for Windows XP is for the beta version.

Page 16: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Vulnerability Density

0

0.002

0.004

0.006

0.008

0.01

0.012

Win 95 NT 4.0 Win 98 Win2000 Win XP

Vuln

erability /

KLO

C

Vulnerability density and defect density

Vulnerability densities: 95/98: 0.33-0.56 NT/2000: 0.63-1.8

VKD/DKD: 0.24-1.62%

Defect Density

0

0.5

1

1.5

2

2.5

3

Win 95 NT 4.0 Win 98 Win2000 Win XP

Defe

ct/K

LO

C

Page 17: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Vulnerability density and defect density

Vulnerability densities: 95/98: 0.33-0.56 NT/2000: 0.63-1.8

VKD/DKD: 0.24-1.62%

Vulnerability Density

0

0.002

0.004

0.006

0.008

0.01

0.012

Win 95 NT 4.0 Win 98 Win2000 Win XP

Vuln

erability /

KLO

C

Defect Density

0

0.5

1

1.5

2

2.5

3

Win 95 NT 4.0 Win 98 Win2000 Win XP

Defe

ct/K

LO

C

Page 18: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Results and conclusions

Vulnerability Discovery models

Time-based model

Effort-based model

Data fits the models

Vulnerability density evaluation

Expected ranges of values

Future work:

Modeling impact of shared code Validation.

Reward analysis

Other risk factors: patches, vulnerability exploitation

Page 19: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Summary and conclusions

We have introduced:

Models:

Time – vulnerability model.

Usage – vulnerability model.

Both models shown acceptable goodness of fit.

Chi-square test.

Measurements:

vulnerability density.

Vulnerability density vs. defect density.

Page 20: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Vulnerability Discovery in

Multi-Version Software

Systems

Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

{jyk6457, malaiya, iray }@cs.colostate.edu

Page 21: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

21

Outline

Motivation for this study

Related Work & Data Sources

Vulnerability Discovery Models (VDMs)

Software Evolution

Multi-version Software Discovery Model

Apache, Mysql and Win XP data

Conclusions and Future Work

Page 22: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

22

Vulnerability Discovery Models

Describe vulnerability discovery against time

Security Maintenance Management

Estimating the number of vulnerabilities

Patch development planning

Guiding Test Effort

Applicable to categories (causes and severity levels)

Software Risk evaluation

Combine with vulnerability exploitation and attack surface

Page 23: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

23

Motivation for Multi-version VDMs

Superposition effect on vulnerability

discovery process due to shared code in

successive versions.

Examination of software evolution: impact on

vulnerability introduction and discovery

Other factors impacting vulnerability

discovery process not considered before

Page 24: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

24

Related Work

Software reliability growth models Logarithmic-Poisson Reliability Model (Musa ‘84)

Vulnerability Discovery Process Quadratic and Linear Models (Rescorla ‘05)

Thermodynamic Model (Anderson ‘01)

Logistic (AML) and Effort-based models (Alhazmi 2004-5)

Software Evolution Trend of software Evolution (Eick ‘01)

Application of Reliability Growth Model Reliability growth using OpenBSD (Ozment ‘06)

Page 25: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

25

Software Evolution

The modification of software during

maintenance or development:

fixes and feature additions.

Influenced by competition

Code decay and code addition introduce new

vulnerabilities

Successive version of a software can share a

significant fraction of code.

Page 26: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

26

Software Evolution: Apache & Mysql

0

10000

20000

30000

40000

50000

60000

70000

80000

90000

100000

1.3.

0

1.3.

2

1.3.

4

1.3.

9

1.3.

12

1.3.

17

1.3.

20

1.3.

23

1.3.

27

1.3.

29

1.3.

32

1.3.

34

1.3.

36

Version Number

LO

C (

Lin

es o

f Code)

Initial Code Added Code

0

100000

200000

300000

400000

500000

600000

4.0.

0

4.0.

2

4.0.

4

4.0.

5a

4.0.

7

4.0.

9

4.0.

11a

4.0.

13

4.0.

15a

4.0.

16

4.0.

18

4.0.

21

4.0.

23

4.0.

24

4.0.

26

Version NumberLO

C (

Lin

es o

f Code)

Initial Code Added Code

Modification: Apache 43%, Mysql 31%

Page 27: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

27

Vulnerability Discovery & Evolution:

Apache & Mysql

Some vulnerabilities are in added code, many are inherited from precious versions.

Mysql DBMS

0%

20%

40%

60%

80%

100%

120%

Oct-

01

Feb-0

2

Jun-0

2

Oct-

02

Feb-0

3

Jun-0

3

Oct-

03

Feb-0

4

Jun-0

4

Oct-

04

Feb-0

5

Jun-0

5

Oct-

05

Feb-0

6

Jun-0

6

Oct-

06

Release DateV

uln

era

bil

itie

s

Code increasing Vulnerability Discovery

Apache

0%

20%

40%

60%

80%

100%

120%

Jun

-98

Jun

-99

Jun

-00

Jun

-01

Jun

-02

Jun

-03

Jun

-04

Jun

-05

Jun

-06

Release Date

Pe

rce

nta

ge

Added Code in Next Version Reliability Growth

c

Page 28: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

28

Code Sharing & Vulnerabilities

Observation

Vulnerability increases

after saturation in AML

modeling

Accounting for

Superposition Effect

Shared components

between several

versions of software

Multiple Software Vulnerability Discovery

Trend

Calendar TimeVuln

era

bility

Dis

covery

rate

1st Version 2nd Version

Shared part Total Version Trend

Total Version Trend

Page 29: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

29

Multi-version Vulnerability Discovery

Model Multiple Software Vulnerability Discovery

Trend

Calendar Time

Vuln

era

bility

Dis

covery

rate

1st Version 2nd Version

Shared part Total Version Trend

Total Version Trend

1''

'

1)(

)('' tBAABt eCB

B

BCe

Bt

Cumulative

MVDM

: fraction of code

used in next

version Previous

Version

Next

Version

Shared

Code

Ratio α

Apache

1.3.24

(3-21-

2002)

2.0.35

(4-6-

2002)

20.16%

Mysql

4.1.1

(12-1-

2003)

5.0.0

(12-22-

2003)

83.52%

Page 30: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

30

One vs Two Humps

One-humped Vulnerability Discovery Model

Calendar Time

Num

ber

of

Vuln

era

bility

Calendar Time

Cum

ula

tive V

uln

era

bility

Superposition affect

Page 31: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

31

Multi-version Vulnerability Discovery

Model

May result in a single hump with

prolonged linear period

One-humped Vulnerability Discovery Trend

Calendar Time

Vuln

era

bility N

um

ber

1st version Shared Total

One-humped Vulnerability Discovery

Calendar Time

Vuln

era

bility R

ate

1st Version 2nd Version Shared Total

Page 32: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Seasonality in Vulnerability

Discovery

in Major Software Systems

HyunChul Joh Yashwant K. Malaiya

Dean2026|[email protected]

Department of Computer Science

Colorado State University

Page 33: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Background

Vulnerability:

“a defect which enables an attacker to bypass security measures” [1]

Vulnerability Discovery Model (VDM):

a probabilistic methods for modeling the discovery of software vulnerabilities [2]

Spans a few years: introduction to replacement

Seasonality: periodic variation well known statistical approach

quite common in economic time series Biological systems, stock markets etc.

[1]Schultz, Brown, and Longstaff, Responding to Computer Security Incidents. 1990

[2]Ozment “Improving vulnerability discovery models,” 2007

Halloween indicator:

Low returns in May-Oct.

Page 34: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Motivation (Visual Observation)

34

0

10

20

30

40

50

60

70

80

90

19

95-0

1

19

95-0

5

19

95-0

9

19

96-0

1

19

96-0

5

19

96-0

9

19

97-0

1

19

97-0

5

19

97-0

9

19

98-0

1

19

98-0

5

19

98-0

9

19

99-0

1

19

99-0

5

19

99-0

9

20

00-0

1

20

00-0

5

20

00-0

9

20

01-0

1

20

01-0

5

20

01-0

9

20

02-0

1

20

02-0

5

20

02-0

9

20

03-0

1

20

03-0

5

20

03-0

9

20

04-0

1

20

04-0

5

20

04-0

9

20

05-0

1

20

05-0

5

20

05-0

9

20

06-0

1

20

06-0

5

20

06-0

9

20

07-0

1

20

07-0

5

20

07-0

9

Nu

mb

er

of

Vu

lnera

bilit

ies (

Cu

mu

lati

ve)

Calendar Time

Windows NT 4.0

cumulative AML each month

Page 35: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Examining Seasonality

Is the seasonal pattern statistically

significant?

Periodicity of the pattern

Analysis:

Seasonal index analysis with test

Autocorrelation Function analysis

Significance

Enhance VDMs’ predicting ability

35

Page 36: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Data Sets

Data Sets to be analyzed here

Windows NT

Internet Information Services (IIS) server

Internet Explorer (IE)

National Vulnerability Database (NVD) [3]

U.S. government repository of vulnerability

management data collected and organized using

specific standards

36 [3] National Institute of Standards and Technology. National Vulnerability Database.

Page 37: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Prevalence in Month

Vulnerabilities Disclosed

WinNT

‘95~’07

IIS

‘96~’07

IE

‘97~’07

Jan 42 15 15

Feb 20 10 32

Mar 12 2 22

Apr 13 11 29

May 18 12 41

Jun 24 17 45

Jul 18 11 53

Aug 17 7 42

Sep 11 6 26

Oct 14 6 20

Nov 18 7 26

Dec 51 28 93

Total 258 132 444

Mean 21.5 11 37

s.d. 12.37 6.78 20.94

37

0.00

0.05

0.10

0.15

0.20

0.25

Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec

Perc

en

tag

e

Month

Percentage of Vuln. for Month

Win NT I I S Internet Explorer

Page 38: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Seasonal Index

Seasonal Index Values

WinNT IIS IE

Jan 1.95 1.36 0.41

Feb 0.93 0.91 0.86

Mar 0.56 0.81 0.59

Apr 0.60 1.00 0.78

May 0.84 1.09 1.11

Jun 1.12 1.55 1.22

Jul 0.84 1.00 1.43

Aug 0.79 0.64 1.14

Sep 0.51 0.55 0.70

Oct 0.65 0.55 0.54

Nov 0.84 0.64 0.70

Dec 2.37 2.55 2.51

19.68 19.68 19.68

78.37 46 130.43

p-value 3.04e-12 3.23e-6 1.42e-6

38

• Seasonal index: measures how much

the average for a particular period

tends to be above (or below) the

expected value

• H0: no seasonality is present. We

will evaluate it using the monthly

seasonal index values given by [4]:

where, si is the seasonal index for ith

month, di is the mean value of ith

month, d is a grand average

[4] Hossein Arsham. Time-Critical Decision Making for Business Administration.

Available: http://home.ubalt. edu/ntsbarsh/Business-stat/stat-data/Forecast.htm#rseasonindx

Page 39: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Autocorrelation function (ACF)

Plot of autocorrelations function values

With time series values of zb, zb+1, …, zn, the ACF at lag

k, denoted by rk, is [5]:

, where

Measures the linear relationship between time series

observations separated by a lag of time units

Hence, when an ACF value is located outside of

confidence intervals at a lag t, it can be thought that

every lag t, there is a relationships along with the time

line

39

[5] B. L. Bowerman and R. T. O'connell, Time Series Forecsting: Unified concepts and computer

implementation. 2nd Ed., Boston: Duxbury Press, 1987

Page 40: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Autocorrelation (ACF):Results

Expected lags corresponding

to 6 months or its multiple

would have their ACF values

outside confidence interval

Upper/lower dotted lines: 95%

confidence intervals.

An event occurring at time t + k

(k > 0) lags behind an event

occurring at time t.

Lags are in month.

40

Page 41: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Conclusion / Future Work

The results show strong seasonality in systems

examined, with higher discovery rates in some

months.

This needs to be taken into account for making

accurate projections.

Study of diverse software products, commercial

and open-source, to identify causes of

seasonality and possible variation across

software systems.

41

Page 42: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

Halloween Indicator

“Also known as “Sell in May and

go away”

Global (1973-1996):

Nov.-April: 12.47% ann., st dev

12.58%

12-months:10.92%, st. dev.

17.76%

36 of 37 developing/developed

nations

Data going back to 1694

“No convincing explanation”

Jacobsen, Ben and Bouman, Sven,The Halloween Indicator, 'Sell in May

and Go Away': Another Puzzle(July 2001). Available at SSRN:

http://ssrn.com/abstract=76248

1950-2008

-0.01

-0.005

0

0.005

0.01

0.015

0.02

Janu

ary

Feb

ruar

y

March

April

May

June

July

Aug

ust

Sep

tembe

r

Octobe

r

Nove

mbe

r

Dece

mbe

r

Retu

rn

Page 43: Quantitative Vulnerability Assessment of Systems Softwarecs530dl/s12/i_VDMS.pdf · 2012. 4. 19. · Motivation for Multi-version VDMs Superposition effect on vulnerability discovery

References

O. H. Alhazmi, Y. K. Malaiya , I. Ray, " Measuring, Analyzing and Predicting Security

Vulnerabilities in Software Systems," Computers and Security Journal, Volume 26,

Issue 3, May 2007, Pages 219-228.

J. Kim, Y. K. Malaiya and I. Ray, "Vulnerability Discovery in Multi-Version Software

Systems," Proc. 10th IEEE Int. Symp. on High Assurance System Engineering (HASE),

Dallas, Nov. 2007, pp. 141-148.

H. Joh and Y. K. Malaiya, "Seasonal Variation in the Vulnerability Discovery Process, "

Proc. 2nd IEEE Int. Conf. Software Testing, Verification, and Validation, April 2009, pp.

191-200.

Guido Schryen, “Is open source security a myth? What do vulnerability and patch data

say?,” Communications of the ACM, May 2011, vol. 54, no. 5, pp. 130-140.