1 1
Colorado State University Yashwant K Malaiya CS 559 Vulnerability Discovery Models
Quantitative Security
CSU Cybersecurity Center Computer Science Dept
Quantitative Security Colorado State University Yashwant K Malaiya - - PowerPoint PPT Presentation
Quantitative Security Colorado State University Yashwant K Malaiya CS 559 Vulnerability Discovery Models CSU Cybersecurity Center Computer Science Dept 1 1 Modeling Vulnerability Discovery Quantitative Vulnerability Assessment Alhazmi
1 1
CSU Cybersecurity Center Computer Science Dept
2
2008
3
4
5
6
7
Time Vulnerabilities
Phase 2 Phase 1 Phase 3
8
Vulnerability time growth model
Time Vulnerabilities
9
Vulnerability time growth model
Time Vulnerabilities
10 Windows 98 A 0.004873 B 37.7328 C 0.5543 χ2 7.365 χ2critial 60.481 P-value 1- 7.6x10-11
Windows 98
5 10 15 20 25 30 35 40 45 Jan-99 Mar-99 May-99 Jul-99 Sep -99 Nov-99 Jan-00 Mar-00 May-00 Jul-00 Sep -00 Nov-00 Jan-01 Mar-01 May-01 Jul-01 Sep -01 Nov-01 Jan-02 Mar-02 May-02 Jul-02 Sep -02
Vulnerabilities
Fitted curve Total vulnerabilites
11
Windows NT 4.0 A 0.000692 B 136 C 0.52288 χ2 35.584 χ2critial 103.01 P-value 0.9999973
Windows NT 4.0
20 40 60 80 100 120 140 160 Aug-96 Dec-96 Apr-97 Aug-97 Dec-97 Apr-98 Aug-98 Dec-98 Apr-99 Aug-99 Dec-99 Apr-00 Aug-00 Dec-00 Apr-01 Aug-01 Dec-01 Apr-02 Aug-02 Dec-02 Apr-03
Vulnerabilities
Total vulnerabilities Fitted curve
12
– The global internet population. – The market share of the system during a period of time.
– The real environment performs an intensive testing. – Malicious activities is relevant to overall activities. – Defined as
Internet Growth 16 36 70 147 248 304 359 451 458 479 513 558 569 587 608 677 682 719 745 757 100 200 300 400 500 600 700 800 Dec., 1995 Dec., 1996 Dec., 1997 Dec., 1998 Dec., 1999
Jul., 2000 Dec., 2000 Mar., 2001 Jun., 2001 Aug., 2001
Jul., 2002 Sep., 2002 Mar., 2003 Sep., 2003 Oct., 2003 Dec., 2003 Feb., 2004 May, 2004 Millions of users
The percentage of the market share of O.S.
10 20 30 40 50 60 May-99 Aug-99 Nov
Feb-00 May-00 Aug-00 Nov
Feb-01 May-01 Aug-01 Nov
Feb-02 May-02 Aug-02 Nov
Feb-03 May-03 Aug-03 Nov
Feb-04 May-04 Installed Base Percentage Windows 95 Windows 98 Windows XP Windows NT Windows 2000 Others
) (
i n i i
P U E ´ = å =
13
Estimating the number of IE users
QUANTITATIVE ANALYSES OF SOFTWARE VULNERABILITIES, HyunChul Joh, 2011
13
14
14
15
proportional to the number of bugs present at time t. − 𝑒𝑂(𝑢) 𝑒𝑢 = 𝛾!𝑂(𝑢) Which yields 𝑂 𝑢 = 𝑂 0 𝑓"#!$
𝑂(0)(1 − 𝑓"#!$)
𝑂(0)𝑓"#!$
15
0.001 0.002 0.003 0.004 0.005 0.006 50000 100000 time (sec.)
20 40 60 80 100 120 140 160 20000 40000 60000 80000 100000 time (sec.)
N(0)
16
[Musa].
5 10 15 20 25 30 35 40 750 1500 2250 3000 3750 4500 5250 6000 6750 7500
Usage (Million user's months) Vulnerabilities
17
Windows 98 B 37 λvu 0.000505 χ2 3.510 χ2critial 44.9853 P-value 1- 3.3x10-11
Windows 98 5 10 15 20 25 30 35 40 750 1500 2250 3000 3750 4500 5250 6000 6750 7500
Usage (Million user's months) Vulnerabilities
Actual Vulnerabilities Fitted curve
18
Win NT 4.0 B 108 λvu 0.003061 χ2 15.05 χ2critial 42.5569 P-value 0.985
Windows NT 4.0
20 40 60 80 100 120 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5
Usage (Millions users months) Vulnerabilities
Actual Vulnerability Fitted
`
19
Windows 98
5 10 15 20 25 30 35 40 45 Jan-99 Mar-99 May-99 Jul-99 Sep -99 Nov-99 Jan-00 Mar-00 May-00 Jul-00 Sep -00 Nov-00 Jan-01 Mar-01 May-01 Jul-01 Sep -01 Nov-01 Jan-02 Mar-02 May-02 Jul-02 Sep -02
Vulnerabilities Fitted curve Total vulnerabilites
20
21
22
23
24
25
System MSLOC Known Defects (1000s) DKD (/Kloc) Known Vulner - abilies VKD (/Kloc) Ratio VKD /DKD Win 95 15 5 0.33 46 0.0031 0.92% NT 4.0
server
16 10 0.625 162 0.0101 1.62% Win 98 18 10 0.556 84 0.0047 0.84% Win2000 35 63 1.8 508 0.0145 0.81% Win XP 40 106.5* 2.66* 728 0.0182 0.68%* Apache HTTP 2006 227 (Unix) 4148 18.27 96 0.423 2.32% Firefox 2.5 24,027 9.61 134 0.0536
MS Thesis Woo, 2006
26
– ordinary software defects – Vulnerabilities
– SRGMs – Defect found-coverage relationship (Malaiya et al 94, 98)
27
30
31
32
Yazdan Movahedi, Michel Cukier, Ilir Gashi, Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models, Computers & Security,, Volume 87, 2019.
33
34
Halloween indicator: Low returns in May-Oct.
35
35
36
Vulnerabilities Disclosed WinNT ‘95~’07 IIS ‘96~’07 IE ‘97~’07 Jan 42 15 15 Feb 20 10 32 Mar 12 2 22 Apr 13 11 29 May 18 12 41 Jun 24 17 45 Jul 18 11 53 Aug 17 7 42 Sep 11 6 26 Oct 14 6 20 Nov 18 7 26 Dec 51 28 93 Total 258 132 444 Mean 21.5 11 37 s.d. 12.37 6.78 20.94 36
0.00 0.05 0.10 0.15 0.20 0.25 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Percentage Month
Percentage of Vuln. for Month
Win NT I I S Internet Explorer
37
Seasonal Index Values WinNT IIS IE Jan 1.95 1.36 0.41 Feb 0.93 0.91 0.86 Mar 0.56 0.81 0.59 Apr 0.60 1.00 0.78 May 0.84 1.09 1.11 Jun 1.12 1.55 1.22 Jul 0.84 1.00 1.43 Aug 0.79 0.64 1.14 Sep 0.51 0.55 0.70 Oct 0.65 0.55 0.54 Nov 0.84 0.64 0.70 Dec 2.37 2.55 2.51 19.68 19.68 19.68 78.37 46 130.43 p-value 3.04e-12 3.23e-6 1.42e-6 37
the average for a particular period tends to be above (or below) the expected value
will evaluate it using the monthly seasonal index values given by [4]: where, si is the seasonal index for ith month, di is the mean value of ith month, d is a grand average
[4] Hossein Arsham. Time-Critical Decision Making for Business Administration. Available: http://home.ubalt. edu/ntsbarsh/Business-stat/stat-data/Forecast.htm#rseasonindx
38
38
[5] B. L. Bowerman and R. T. O'connell, Time Series Forecsting: Unified concepts and computer
39
months or its multiple would have their ACF values outside confidence interval
confidence intervals.
> 0) lags behind an event
39
40
40
Exploitation",International Journal of Information Security, July 2016, pp 1-18.
41
41
Activity" Proc. Int. Symp. Software Reliability Eng. (ISSRE), FA, November 2010, pp. 408-409
42
away”
– Nov.-April: 12.47% ann., st dev 12.58% – 12-months:10.92%, st. dev. 17.76%
nations
Jacobsen, Ben and Bouman, Sven,The Halloween Indicator, 'Sell in May and Go Away': Another Puzzle(July 2001). Available at SSRN: http://ssrn.com/abstract=76248
1950-2008
0.005 0.01 0.015 0.02 J a n u a r y F e b r u a r y M a r c h A p r i l M a y J u n e J u l y A u g u s t S e p t e m b e r O c t
e r N
e m b e r D e c e m b e r Return
43 43
CSU Cybersecurity Center Computer Science Dept
44
44
45
45
46
47
47
48 48
10000 20000 30000 40000 50000 60000 70000 80000 90000 100000 1.3.0 1.3.2 1.3.4 1.3.9 1.3.12 1.3.17 1.3.20 1.3.23 1.3.27 1.3.29 1.3.32 1.3.34 1.3.36 Version Number LOC (Lines of Code) Initial Code Added Code 100000 200000 300000 400000 500000 600000 4 . . 4 . . 2 4 . . 4 4 . . 5 a 4 . . 7 4 . . 9 4 . . 1 1 a 4 . . 1 3 4 . . 1 5 a 4 . . 1 6 4 . . 1 8 4 . . 2 1 4 . . 2 3 4 . . 2 4 4 . . 2 6 Version Number LOC (Lines of Code) Initial Code Added Code
Modification: Apache 43%, Mysql 31%
49 49
Some vulnerabilities are in added code, many are inherited from precious versions.
Mysql DBMS
0% 20% 40% 60% 80% 100% 120% Oct-01 Feb-02 Jun-02 Oct-02 Feb-03 Jun-03 Oct-03 Feb-04 Jun-04 Oct-04 Feb-05 Jun-05 Oct-05 Feb-06 Jun-06 Oct-06 Release Date Vulnerabilities Code increasing Vulnerability Discovery
Ap Apache
0% 20% 40% 60% 80% 100% 120% Jun-98 Jun-99 Jun-00 Jun-01 Jun-02 Jun-03 Jun-04 Jun-05 Jun-06
Release Date
Percentage Added Code in Next Version Reliability Growth
c
50 50
Multiple Software Vulnerability Discovery Trend
Calendar Time Vulnerability Discovery rate
1st Version 2nd Version Shared part Total Version Trend Total Version Trend
51 51
Multiple Software Vulnerability Discovery Trend
Calendar Time Vulnerability Discovery rate
1st Version 2nd Version Shared part Total Version Trend Total Version Trend
Previous Version Next Version Shared Code Ratio α Apache 1.3.24 (3-21- 2002) 2.0.35 (4-6- 2002) 20.16% Mysql 4.1.1 (12-1- 2003) 5.0.0 (12-22- 2003) 83.52%
52 52
One-humped Vulnerability Discovery Model
Calendar Time Number of Vulnerability
Calendar Time Cumulative Vulnerability
Superposition affect
53 53
One-humped Vulnerability Discovery Trend
Calendar Time Vulnerability Number
1st version Shared Total
One-humped Vulnerability Discovery
Calendar Time Vulnerability Rate
1st Version 2nd Version Shared Total
54 54
55 55
Joh’s thesis
stays the same.
56 56
Data from Joh’s thesis
57 57
2000 4000 6000 8000 10000 12000 14000 16000 18000 20000 1990 1995 2000 2005 2010 2015 2020 2025
Vulnerabilities (Yearly)
TotVul Msft
58 58
500 1000 1500 2000 1990 1995 2000 2005 2010 2015 2020 2025
Vulnerabilites (Yearly)
Msft XP win 10
59 59
5 10 15 20 25 30 1985 1990 1995 2000 2005 2010 2015 2020 2025
Linux Kernel size
60 60
61 61
– Before disclosure: black hat people/organizations – after disclosure: when patch development is taking time