Consensus forecasting of zero-day vulnerabilities for network security

David C. Last
{"title":"Consensus forecasting of zero-day vulnerabilities for network security","authors":"David C. Last","doi":"10.1109/CCST.2016.7815718","DOIUrl":null,"url":null,"abstract":"Network defenders are locked in a constant race with attackers as they try to defend their networks. The defenders suffer from a huge disadvantage: they lack knowledge of the existence of zero-day vulnerabilities that have not been yet been discovered or publically disclosed, but that are still weakening the security of their networks. It would be a huge advantage to these defenders if they had some idea of where and when these vulnerabilities would appear and how severe they would be. The research presented here is directed towards producing accurate forecasts of the location and severity of zero-day vulnerabilities that will be discovered in the next 12-24 months. Forecasts of future zero-day vulnerabilities can be incorporated into Attack Surface security metrics that calculate the security posture of a network. Incorporating yet-to-be-discovered vulnerabilities into these calculations will alert network defenders to potential areas of weakness before they become a problem. In this research, three distinct forecasting model suites based on regression models and machine learning are used. These forecast model suites are applied to zero-day vulnerability discovery at the global and category (web browser, operating system, and video player) levels. Preliminary results demonstrate, as expected, that different models provide better forecasts at different times, but that it is difficult to predict which models will perform better under which circumstances. Therefore, the outputs of the forecast models are combined using consensus models based on Quantile Regression Averaging (QRA) and other techniques. These consensus models are expected to perform better than most individual forecast models over time, and experimental results demonstrate the strength of these consensus models. It is also important to understand the margin of error in these forecasts. QRA and other methods generate 68% and 95% confidence bounds around the forecasts, which give network defenders an idea of the best- and worst-case scenarios for which they should prepare. Experimental results generated by the consensus models demonstrate the strength of the forecasts and the confidence bounds. The results make a strong case for continuing this work by applying it to individual software applications.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815718","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Network defenders are locked in a constant race with attackers as they try to defend their networks. The defenders suffer from a huge disadvantage: they lack knowledge of the existence of zero-day vulnerabilities that have not been yet been discovered or publically disclosed, but that are still weakening the security of their networks. It would be a huge advantage to these defenders if they had some idea of where and when these vulnerabilities would appear and how severe they would be. The research presented here is directed towards producing accurate forecasts of the location and severity of zero-day vulnerabilities that will be discovered in the next 12-24 months. Forecasts of future zero-day vulnerabilities can be incorporated into Attack Surface security metrics that calculate the security posture of a network. Incorporating yet-to-be-discovered vulnerabilities into these calculations will alert network defenders to potential areas of weakness before they become a problem. In this research, three distinct forecasting model suites based on regression models and machine learning are used. These forecast model suites are applied to zero-day vulnerability discovery at the global and category (web browser, operating system, and video player) levels. Preliminary results demonstrate, as expected, that different models provide better forecasts at different times, but that it is difficult to predict which models will perform better under which circumstances. Therefore, the outputs of the forecast models are combined using consensus models based on Quantile Regression Averaging (QRA) and other techniques. These consensus models are expected to perform better than most individual forecast models over time, and experimental results demonstrate the strength of these consensus models. It is also important to understand the margin of error in these forecasts. QRA and other methods generate 68% and 95% confidence bounds around the forecasts, which give network defenders an idea of the best- and worst-case scenarios for which they should prepare. Experimental results generated by the consensus models demonstrate the strength of the forecasts and the confidence bounds. The results make a strong case for continuing this work by applying it to individual software applications.
网络安全零日漏洞的共识预测
当网络防御者试图保护自己的网络时,他们被锁定在与攻击者的持续竞争中。防御者面临着一个巨大的劣势:他们不知道零日漏洞的存在,这些漏洞尚未被发现或公开披露,但仍在削弱其网络的安全性。如果这些防御者知道这些漏洞会在何时何地出现,以及它们会有多严重,那将是一个巨大的优势。本文提出的研究旨在准确预测未来12-24个月内将发现的零日漏洞的位置和严重程度。对未来零日漏洞的预测可以合并到计算网络安全态势的攻击面安全指标中。将尚未发现的漏洞合并到这些计算中,可以在网络防御者发现潜在的弱点之前提醒他们。在本研究中,使用了基于回归模型和机器学习的三种不同的预测模型套件。这些预测模型套件应用于全局和类别(web浏览器、操作系统和视频播放器)级别的零日漏洞发现。正如预期的那样,初步结果表明,不同的模型在不同的时间提供更好的预测,但很难预测哪种模型在哪种情况下表现更好。因此,预测模型的输出使用基于分位数回归平均(QRA)和其他技术的共识模型进行组合。随着时间的推移,这些共识模型有望比大多数单独的预测模型表现得更好,实验结果证明了这些共识模型的强度。了解这些预测的误差范围也很重要。QRA和其他方法在预测周围产生68%和95%的置信区间,这使网络防御者了解他们应该准备的最佳和最坏情况。由共识模型产生的实验结果证明了预测的强度和置信范围。结果通过将其应用于单个软件应用程序,为继续这项工作提供了强有力的理由。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信