Analysis and Modeling of Android Software Vulnerabilities: A Numerical Approach

Author:

Gencer Kerem1,Başçiftçi Fatih2

Affiliation:

1. Afyonkarahisar Health Sciences University

2. Selcuk University Faculty of Technology

Abstract

Abstract A software security vulnerability is a mistake or violation of the security policy that occurs during the creation or development of the software. A vulnerability discovery model is a structure enabling the prediction of software security vulnerabilities that might occur after the software is released. In a more general sense, modeling is the method that allows us to analyze a phenomenon in detail and make accurate predictions for the future. The model must be able to explain the target environment in the best way possible and make the best predictions possible. Recently, there have been many studies on the subject of modeling security vulnerabilities. Most of these studies are concerned with desktop operating systems and internet browsers. Although there are studies based on the most popular mobile operating system, Android, there has never been a study that investigates different statistical distributions to find the most suitable one. The most popular model for vulnerability prediction is the Alhazmi-Malaiya Logistic (AML) model. This model has been observed to achieve better performance than other models in modeling security vulnerabilities. The AML model is similar to a logistic distribution, which has a symmetrical structure. In this study, certain aspects of Android security vulnerabilities were investigated using some symmetric and asymmetric distributions that are close to the AML distribution. The data used in this study was obtained from the National Vulnerability Database (NVD) by filtering Android vulnerabilities from 2016 to 2018, a time interval in which monthly information was continuously available. Furthermore, with the 0 to 10 scoring data obtained from the Common Vulnerability Scoring System (CVSS), the average monthly impact values of vulnerabilities have also been modeled. Logistic, Weibull, Normal, Nakagami, Gamma, and Log-logistic distributions were used to model the average monthly impact values of vulnerabilities, and the Logistic, Weibull, Nakagami, Gamma, and Log-logistic distributions were used to model the monthly vulnerability count. From the goodness-of-fit tests, which are methods to establish how well sample data matches the expected distribution values, Kolmogorov-Smirnov, Anderson-Darling, and Cramer-von Mises tests were applied. Akaike and Bayesian Information Criteria and Log-likelihood were used to see how robust the models were. As a result, the average monthly impact value and the monthly vulnerability count were observed to be best modeled by the Logistic and Nakagami distributions, respectively. Vulnerability detection models help us forecast software vulnerabilities and enable the necessary precautions to be taken, such as planning the generation of a patch. With suitable distributions, it has been shown that Android vulnerabilities can be modeled and forecasts can be made.

Publisher

Research Square Platform LLC

Reference69 articles.

1. Log-logistic flood frequency analysis;Ahmad MI;Journal of Hydrology,1988

2. A new look at the statistical model identification;Akaike H;IEEE Transactions on Automatic Control,1974

3. Alhazmi, O., Malaiya, Y. and Ray, I., 2005, Security Vulnerabilities in Software Systems: A Quantitative Perspective, Data and Applications Security XIX, Berlin, Heidelberg, 281–294.

4. Alhazmi, O. H. and Malaiya, Y. K., 2005a, Modeling the vulnerability discovery process, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05), 10 pp.-138.

5. Alhazmi, O. H. and Malaiya, Y. K., 2005b, Quantitative vulnerability assessment of systems software, Annual Reliability and Maintainability Symposium, 2005. Proceedings, 615–620.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3