23
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and users quickly install those patches as soon as they are available. However, most vulnerabilities are never actually exploited. Since writing, testing, and installing software patches can involve considerable resources, it would be desirable to prioritize the remediation of vulnerabilities that are likely to be exploited. Several published research studies have reported moderate success in applying machine learning techniques to the task of predicting whether a vulnerability will be exploited. These approaches typically use features derived from vulnerability databases (such as the summary text describing the vulnerability) or social media posts that mention the vulnerability by name. However, these prior studies share multiple methodological shortcomings that inflate predictive power of these approaches. We replicate key portions of the prior work, compare their approaches, and show how selection of training and test data critically affect the estimated performance of predictive models. The results of this study point to important methodological considerations that should be taken into account so that results reflect real-world utility.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Outside the Closed World: On Using Machine Learning for Network Intrusion Detection

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Before we knew it

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Beyond heuristics

                Bookmark

                Author and article information

                Journal
                25 July 2017
                Article
                10.1145/3041008.3041009
                1707.08015
                fa4393e8-a2a6-4b2d-932f-72190a534f3f

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                In Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics (IWSPA 2017). ACM, New York, NY, USA, 45-53
                cs.CR stat.AP stat.ML

                Comments

                Comment on this article