Patching zero-day vulnerabilities: an empirical analysis

被引:10
|
作者
Roumani, Yaman [1 ]
机构
[1] Oakland Univ, Dept Decis & Informat Sci, 275 Varner Dr, Rochester, MI 48309 USA
来源
JOURNAL OF CYBERSECURITY | 2021年 / 7卷 / 01期
关键词
zero-day vulnerability; patch release time; survival analysis; vulnerability; attributes; SOFTWARE VENDORS; SECURITY; INFORMATION; MANAGEMENT; RELEASE; TIME; SYSTEMS; IMPACT; POLICY; RISKS;
D O I
10.1093/cybsec/tyab023
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Zero-day vulnerabilities remain one of the major security threats that are faced by organizations. Once a vendor learns about a zero-day vulnerability, releasing a timely patch becomes a priority given the risk of zero-day exploits. However, we still lack information on the factors that affect patch release time of such vulnerabilities. The main objective of this study is to examine the impact of other as-yet unexplored factors on the patch release time of zero-day vulnerabilities. Using zeroday vulnerability dataset captured between 2010 and 2020, we employ survival analysis technique. Our model explores the impact of vulnerability attack vector, attack complexity, privileges required, user interaction, scope, confidentiality, integrity, and availability impact on patch release timing. Findings show that a zero-day vulnerability is more likely to be patched on time if the vulnerability results in a scope change and affects more vendors, products, and versions. However, a zero-day vulnerability is less likely to be patched on time if it requires privileges and impacts confidentiality. Our sub-analyses also reveal how patch release times vary across different products and vulnerability types.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [42] Big Data Framework for Zero-Day Malware Detection
    Gupta, Deepak
    Rani, Rinkle
    CYBERNETICS AND SYSTEMS, 2018, 49 (02) : 103 - 121
  • [43] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes
    Chen Ting
    Zhang Xiaosong
    Liu Zhi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
  • [44] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [45] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [46] ZEKI: unsupervised zero-day exploit kit intelligence
    Suren, Emre
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (04) : 1859 - 1870
  • [47] Zero-day recovery: the key to mitigating the ransomware threat
    Fagioli A.
    Computer Fraud and Security, 2019, 2019 (01): : 6 - 9
  • [48] Towards Probabilistic Identification of Zero-day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 64 - 72
  • [49] Protecting Embedded Systems from Zero-Day Attacks
    Taylor, Stephen
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168
  • [50] A Survey on Zero-Day Polymorphic Worm Detection Techniques
    Kaur, Ratinder
    Singh, Maninder
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1520 - 1549