Author:
Bhatt Navneet,Anand Adarsh,Aggrawal Deepti
Abstract
PurposeThe purpose of this paper is to provide a mathematical framework to optimally allocate resources required for the discovery of vulnerabilities pertaining to different severity risk levels.Design/methodology/approachDifferent sets of optimization problems have been formulated and using the concept of dynamic programming approach, sequence of recursive functions has been constructed for the optimal allocation of resources used for discovering vulnerabilities of different severity scores. Mozilla Thunderbird web browser data set has been considered for giving the empirical evaluation by working with vulnerabilities of different severities.FindingsAs per the impact associated with a vulnerability, critical and high severity level are required to be patched promptly, and hence, a larger amount of funds have to be allocated for vulnerability discovery. Nevertheless, a low or medium risk vulnerability might also get exploited and thereby their discovery is also crucial for higher severity vulnerabilities. The current framework provides a diversified allocation of funds as per the requirement of a software manager and also aims at improving the discovery of vulnerability significantly.Practical implicationsThe finding of this research may enable software managers to adequately assign resources in managing the discovery of vulnerabilities. It may also help in acknowledging the funds required for various bug bounty programs to cater security reporters based on the potential number of vulnerabilities present in software.Originality/valueMuch of the attention has been focused on the vulnerability discovery modeling and the risk associated with the security flaws. But, as far as the authors’ knowledge is concern, there is no such study that incorporates optimal allocation of resources with respect to the vulnerabilities of different severity scores. Hence, the building block of this paper contributes to future research.
Subject
Strategy and Management,General Business, Management and Accounting
Reference30 articles.
1. Modeling the vulnerability discovery process,2005
2. Measuring, analyzing and predicting security vulnerabilities in software systems;Computers & Security,2007
3. Vulnerability discovery modeling and weighted criteria based ranking;Journal of the Indian Society for Probability and Statistics,2016
4. Resource allocation problem for multi versions of software system,2019
5. Optimization models for reliability of modular software systems;IEEE Transactions on Software Engineering,1993
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献