Patching zero-day vulnerabilities: an empirical analysis

被引:10
|
作者
Roumani, Yaman [1 ]
机构
[1] Oakland Univ, Dept Decis & Informat Sci, 275 Varner Dr, Rochester, MI 48309 USA
来源
JOURNAL OF CYBERSECURITY | 2021年 / 7卷 / 01期
关键词
zero-day vulnerability; patch release time; survival analysis; vulnerability; attributes; SOFTWARE VENDORS; SECURITY; INFORMATION; MANAGEMENT; RELEASE; TIME; SYSTEMS; IMPACT; POLICY; RISKS;
D O I
10.1093/cybsec/tyab023
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Zero-day vulnerabilities remain one of the major security threats that are faced by organizations. Once a vendor learns about a zero-day vulnerability, releasing a timely patch becomes a priority given the risk of zero-day exploits. However, we still lack information on the factors that affect patch release time of such vulnerabilities. The main objective of this study is to examine the impact of other as-yet unexplored factors on the patch release time of zero-day vulnerabilities. Using zeroday vulnerability dataset captured between 2010 and 2020, we employ survival analysis technique. Our model explores the impact of vulnerability attack vector, attack complexity, privileges required, user interaction, scope, confidentiality, integrity, and availability impact on patch release timing. Findings show that a zero-day vulnerability is more likely to be patched on time if the vulnerability results in a scope change and affects more vendors, products, and versions. However, a zero-day vulnerability is less likely to be patched on time if it requires privileges and impacts confidentiality. Our sub-analyses also reveal how patch release times vary across different products and vulnerability types.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Detection of Zero-day Malware Based on the Analysis of Opcode Sequences
    Zolotukhin, Mikhail
    Hamalainen, Timo
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [22] Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks
    Clark, Shane S.
    Paulos, Aaron
    Benyo, Brett
    Pal, Partha
    Schantz, Richard
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 80 - 89
  • [23] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 200 - 204
  • [24] Markets for Zero-Day Exploits: Ethics and Implications
    Egelman, Serge
    Herley, Cormac
    van Oorschot, Paul C.
    PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13), 2013, : 41 - 46
  • [25] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 200 - 204
  • [26] A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing
    Shahzad, Khurram
    Woodhead, Steve
    Bakalis, Panos
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 54 - 64
  • [27] Zero-Day Evasion Attack Analysis on Race between Attack and Defense
    Kwon, Hyun
    Yoon, Hyunsoo
    Choi, Daeseon
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 805 - 807
  • [28] Zero-Day Threats Detection for Critical Infrastructures
    Nkongolo, Mike
    Tokmak, Mahmut
    SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS, SAICSIT 2023, 2023, 1878 : 32 - 47
  • [29] Detecting Zero-day Polymorphic Worm: A Review
    Sulieman, Sulieman Mohamed Ali
    Fadlalla, Yahia A.
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [30] Invisible and Forgotten: Zero-Day Blooms in the IoT
    Palani, Kartik
    Holt, Emily
    Smith, Sean
    2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,