Forecasting IT Security Vulnerabilities - An Empirical Analysis
E. Yasasin, J. Prester, G. Wagner, G. Schryen, Computers & Security 88 (2020).
Download
Journal Article
| Published
| English
Author
Yasasin, Emrah;
Prester, Julian;
Wagner, Gerit;
Schryen, GuidoLibreCat
Abstract
Today, organizations must deal with a plethora of IT security threats and to ensure smooth and
uninterrupted business operations, firms are challenged to predict the volume of IT security vulnerabilities
and allocate resources for fixing them. This challenge requires decision makers to assess
which system or software packages are prone to vulnerabilities, how many post-release vulnerabilities
can be expected to occur during a certain period of time, and what impact exploits might have.
Substantial research has been dedicated to techniques that analyze source code and detect security
vulnerabilities. However, only limited research has focused on forecasting security vulnerabilities
that are detected and reported after the release of software. To address this shortcoming, we apply
established methodologies which are capable of forecasting events exhibiting specific time series
characteristics of security vulnerabilities, i.e., rareness of occurrence, volatility, non-stationarity,
and seasonality. Based on a dataset taken from the National Vulnerability Database (NVD), we use
the Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) to measure the forecasting
accuracy of single, double, and triple exponential smoothing methodologies, Croston's methodology,
ARIMA, and a neural network-based approach. We analyze the impact of the applied forecasting
methodology on the prediction accuracy with regard to its robustness along the dimensions of the
examined system and software package "operating systems", "browsers" and "office solutions" and
the applied metrics. To the best of our knowledge, this study is the first to analyze the effect
of forecasting methodologies and to apply metrics that are suitable in this context. Our results
show that the optimal forecasting methodology depends on the software or system package, as some
methodologies perform poorly in the context of IT security vulnerabilities, that absolute metrics
can cover the actual prediction error precisely, and that the prediction accuracy is robust within the
two applied forecasting-error metrics.
Publishing Year
Journal Title
Computers & Security
Volume
88
Issue
January
ISSN
LibreCat-ID
Cite this
Yasasin E, Prester J, Wagner G, Schryen G. Forecasting IT Security Vulnerabilities - An Empirical Analysis. Computers & Security. 2020;88(January).
Yasasin, E., Prester, J., Wagner, G., & Schryen, G. (2020). Forecasting IT Security Vulnerabilities - An Empirical Analysis. Computers & Security, 88(January).
@article{Yasasin_Prester_Wagner_Schryen_2020, title={Forecasting IT Security Vulnerabilities - An Empirical Analysis}, volume={88}, number={January}, journal={Computers & Security}, author={Yasasin, Emrah and Prester, Julian and Wagner, Gerit and Schryen, Guido}, year={2020} }
Yasasin, Emrah, Julian Prester, Gerit Wagner, and Guido Schryen. “Forecasting IT Security Vulnerabilities - An Empirical Analysis.” Computers & Security 88, no. January (2020).
E. Yasasin, J. Prester, G. Wagner, and G. Schryen, “Forecasting IT Security Vulnerabilities - An Empirical Analysis,” Computers & Security, vol. 88, no. January, 2020.
Yasasin, Emrah, et al. “Forecasting IT Security Vulnerabilities - An Empirical Analysis.” Computers & Security, vol. 88, no. January, 2020.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
File Name
Access Level
Open Access
Last Uploaded
2019-09-09T18:24:35Z