Repository logo
 
Publication

Measuring the risk of vulnerabilities exploitation

dc.contributor.authorBrilhante, Maria de Fátima
dc.contributor.authorPestana, Dinis
dc.contributor.authorPestana, Pedro
dc.contributor.authorRocha, Maria Luísa
dc.date.accessioned2025-05-27T15:33:36Z
dc.date.available2025-05-27T15:33:36Z
dc.date.issued2024-03
dc.description.abstractModeling the vulnerabilities lifecycle and exploitation frequency are at the core of security of networks evaluation. Pareto, Weibull, and log-normal models have been widely used to model the exploit and patch availability dates, the time to compromise a system, the time between compromises, and the exploitation volumes. Random samples (systematic and simple random sampling) of the time from publication to update of cybervulnerabilities disclosed in 2021 and in 2022 are analyzed to evaluate the goodness-of-fit of the traditional Pareto and log-normal laws. As censoring and thinning almost surely occur, other heavy-tailed distributions in the domain of attraction of extreme value or geo-extreme value laws are investigated as suitable alternatives. Goodness-of-fit tests, the Akaike information criterion (AIC), and the Vuong test, support the statistical choice of log-logistic, a geo-max stable law in the domain of attraction of the Fréchet model of maxima, with hyperexponential and general extreme value fittings as runners-up. Evidence that the data come from a mixture of differently stretched populations affects vulnerabilities scoring systems, specifically the common vulnerabilities scoring system (CVSS).eng
dc.identifier.doi10.3390/appliedmath4010002
dc.identifier.eid85201595215
dc.identifier.issn2673-9909
dc.identifier.urihttp://hdl.handle.net/10400.14/53445
dc.language.isoeng
dc.peerreviewedyes
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectCVSS metrics
dc.subjectCybervulnerabilities
dc.subjectExtremes and thinned extremes
dc.subjectHeavy-tailed models
dc.subjectRisk management
dc.subjectVulnerabilities lifecycle
dc.titleMeasuring the risk of vulnerabilities exploitationeng
dc.typeresearch article
dspace.entity.typePublication
oaire.citation.endPage54
oaire.citation.issue1
oaire.citation.startPage20
oaire.citation.titleAppliedMath
oaire.citation.volume4
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
118148894.pdf
Size:
2.22 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.44 KB
Format:
Item-specific license agreed upon to submission
Description: