Patching zero-day vulnerabilities: an empirical analysis

被引:10
|
作者
Roumani, Yaman [1 ]
机构
[1] Oakland Univ, Dept Decis & Informat Sci, 275 Varner Dr, Rochester, MI 48309 USA
来源
JOURNAL OF CYBERSECURITY | 2021年 / 7卷 / 01期
关键词
zero-day vulnerability; patch release time; survival analysis; vulnerability; attributes; SOFTWARE VENDORS; SECURITY; INFORMATION; MANAGEMENT; RELEASE; TIME; SYSTEMS; IMPACT; POLICY; RISKS;
D O I
10.1093/cybsec/tyab023
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Zero-day vulnerabilities remain one of the major security threats that are faced by organizations. Once a vendor learns about a zero-day vulnerability, releasing a timely patch becomes a priority given the risk of zero-day exploits. However, we still lack information on the factors that affect patch release time of such vulnerabilities. The main objective of this study is to examine the impact of other as-yet unexplored factors on the patch release time of zero-day vulnerabilities. Using zeroday vulnerability dataset captured between 2010 and 2020, we employ survival analysis technique. Our model explores the impact of vulnerability attack vector, attack complexity, privileges required, user interaction, scope, confidentiality, integrity, and availability impact on patch release timing. Findings show that a zero-day vulnerability is more likely to be patched on time if the vulnerability results in a scope change and affects more vendors, products, and versions. However, a zero-day vulnerability is less likely to be patched on time if it requires privileges and impacts confidentiality. Our sub-analyses also reveal how patch release times vary across different products and vulnerability types.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Revenue maximizing markets for zero-day exploits
    Guo, Mingyu
    Wang, Guanhua
    Hata, Hideaki
    Babar, Muhammad Ali
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2021, 35 (02)
  • [32] Network Behavioral Analysis for Zero-Day Malware Detection - A Case Study
    Ganame, Karim
    Allaire, Marc Andre
    Zagdene, Ghassen
    Boudar, Oussama
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 169 - 181
  • [33] Zero-Day Reconciliation of BitTorrent Users with Their ISPs
    Slot, Marco
    Costa, Paolo
    Pierre, Guillaume
    Rai, Vivek
    EURO-PAR 2009: PARALLEL PROCESSING, PROCEEDINGS, 2009, 5704 : 561 - 573
  • [34] Classification and online clustering of zero-day malware
    Jureckova, Olha
    Jurecek, Martin
    Stamp, Mark
    Di Troia, Fabio
    Lorencz, Robert
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04) : 579 - 592
  • [35] A Zero-Day Cloud Timing Channel Attack
    Flowers, Robert
    IEEE ACCESS, 2022, 10 : 128177 - 128186
  • [36] Revenue maximizing markets for zero-day exploits
    Mingyu Guo
    Guanhua Wang
    Hideaki Hata
    Muhammad Ali Babar
    Autonomous Agents and Multi-Agent Systems, 2021, 35
  • [37] Revenue Maximizing Markets for Zero-Day Exploits
    Guo, Mingyu
    Hata, Hideaki
    Babar, Ali
    PRIMA 2016: PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS, 2016, 9862 : 247 - 260
  • [38] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [39] Defence against the dark art of zero-day attacks
    Madou M.
    Network Security, 2022, 2022 (11)
  • [40] Zero-Day Exploits Framework of Supply Chain Networks
    Khandelwal, Abhi
    Mahato, Dharmendra Prasad
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 319 - 335