Coverage-based vulnerability discovery modeling to optimize disclosure time using multiattribute approach

被引:7
|
作者
Kansal, Yogita [1 ]
Kapur, Parmod Kumar [2 ]
Kumar, Uday [3 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, India
[2] Amity Univ, Amity Ctr Interdisciplinary Res, Noida, India
[3] Lulea Univ Technol, Operat & Maintenance Engn, Lulea, Sweden
关键词
multiattribute utility theory (MAUT); operational coverage; operational effort; optimization; vulnerability discovery model; SOFTWARE-RELIABILITY GROWTH;
D O I
10.1002/qre.2380
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Software vulnerabilities trend over time has been proposed by various researchers and academicians in recent years. But none of them have considered operational coverage function in vulnerability discovery modeling. In this research paper, we have proposed a generalized statistical model that determines the relationship between operational coverage function and the number of expected vulnerabilities. During the operational phase, possible vulnerable sites are covered and vulnerabilities present at a particular site are discovered with some probability. We have assumed that the proposed model follows the nonhomogeneous Poisson process properties; thus, different distributions are used to formulate the model. The numerical illustration shows that the proposed model performs better and has the good fitness to the Google Chrome data. The second focus of this research paper is to evaluate the total cost incurred by the developer after software release and to identify the optimal vulnerability disclosure time through multiobjective utility function. The proposed vulnerability discovery helps in optimization. The optimal time problem depends on the combined effect of cost, risk, and effort.
引用
收藏
页码:62 / 73
页数:12
相关论文
共 50 条
  • [1] Effort and Coverage Dependent Vulnerability Discovery Modeling
    Kansal, Yogita
    Kapur, P. K.
    Kumar, Uday
    Kumar, Deepak
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 329 - 334
  • [2] Virtual Coverage: A New Approach to Coverage-Based Software Reliability Engineering
    Park, Joong-Yang
    Lee, Gyemin
    COMMUNICATIONS FOR STATISTICAL APPLICATIONS AND METHODS, 2013, 20 (06) : 467 - 474
  • [3] A Random and Coverage-based Approach for Fault Localization Prioritization
    Zhang, Xiao-Yi
    Towey, Dave
    Chen, Tsong Yueh
    Zheng, Zheng
    Cai, Kai-Yuan
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 3354 - 3361
  • [4] A Greedy Approach for Coverage-Based Test Suite Reduction
    Harris, Preethi
    Raju, Nedunchezhian
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (01) : 17 - 23
  • [5] A Coverage-Based Approach to Recommendation Diversity On Similarity Graph
    Parambath, Shameem A. Puthiya
    Usunier, Nicolas
    Grandvalet, Yves
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS'16), 2016, : 15 - 22
  • [6] Coverage-Based Classification Using Association Rule Mining
    Mattiev, Jamolbek
    Kavsek, Branko
    APPLIED SCIENCES-BASEL, 2020, 10 (20): : 1 - 18
  • [7] Coverage-Based Clustering and Scheduling Approach for Test Case Prioritization
    Fu, Wenhao
    Yu, Huiqun
    Fan, Guisheng
    Ji, Xiang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (06): : 1218 - 1230
  • [8] A Path Coverage-Based Reduction of Test Cases and Execution Time Using Parallel Execution
    Singh, Leena
    Singh, Shailendra Narayan
    SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 623 - 630
  • [9] A usage coverage-based approach for assessing product family design
    Jiliang Wang
    Bernard Yannou
    Fabrice Alizon
    Pierre-Alain Yvars
    Engineering with Computers, 2013, 29 : 449 - 465
  • [10] A Coverage-based Approach to Nondiscrimination-aware Data Transformation
    Accinelli, Chiara
    Catania, Barbara
    Guerrini, Giovanna
    Minisi, Simone
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2022, 14 (04):