Big Data for Cybersecurity

Vulnerability Disclosure Trends and Dependencies

Mingjian Tang, Mamoun Alazab, Yuxiu Luo

Research output: Contribution to journalArticleResearchpeer-review

Abstract

Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised attacks will increasingly be crafted to exploit vulnerabilities and weaknesses. With the ever-increasing trend of cybercrime and incidents due to these vulnerabilities, effective vulnerability management is imperative for modern organisations regardless of their size. However, organisations struggle to manage the sheer volume of vulnerabilities discovered on their networks. Moreover, vulnerability management tends to be more reactive in practice. Rigorous statistical models, simulating anticipated volume and dependence of vulnerability disclosures, will undoubtedly provide important insights to organisations and help them become more proactive in the management of cyber risks. By leveraging the rich yet complex historical vulnerability data, our proposed novel and rigorous framework has enabled this new capability. By utilising this sound framework, we initiated an important study on not only handling persistent volatilities in the data but also further unveiling multivariate dependence structure amongst different vulnerability risks. In sharp contrast to the existing studies on univariate time series, we consider the more general multivariate case striving to capture their intriguing relationships. Through our extensive empirical studies using the real world vulnerability data, we have shown that a composite model can effectively capture and preserve long-term dependency between different vulnerability and exploit disclosures. In addition, the paper paves the way for further study on the stochastic perspective of vulnerability proliferation towards building more accurate measures for better cyber risk management as a whole.
Original languageEnglish
Pages (from-to)317-329
Number of pages13
JournalIEEE Transactions on Big Data
Volume5
Issue number3
DOIs
Publication statusPublished - 5 Jul 2017
Externally publishedYes

Fingerprint

Risk management
Time series
Acoustic waves
Big data
Disclosure
Vulnerability
Composite materials
Statistical Models
Attack
Cybercrime
Statistical model
Threat
Proliferation
Incidents
Empirical study
Risk vulnerability
Dependence structure

Cite this

@article{fba436cdbd8843f2bd9b2fdb0d66930e,
title = "Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies",
abstract = "Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised attacks will increasingly be crafted to exploit vulnerabilities and weaknesses. With the ever-increasing trend of cybercrime and incidents due to these vulnerabilities, effective vulnerability management is imperative for modern organisations regardless of their size. However, organisations struggle to manage the sheer volume of vulnerabilities discovered on their networks. Moreover, vulnerability management tends to be more reactive in practice. Rigorous statistical models, simulating anticipated volume and dependence of vulnerability disclosures, will undoubtedly provide important insights to organisations and help them become more proactive in the management of cyber risks. By leveraging the rich yet complex historical vulnerability data, our proposed novel and rigorous framework has enabled this new capability. By utilising this sound framework, we initiated an important study on not only handling persistent volatilities in the data but also further unveiling multivariate dependence structure amongst different vulnerability risks. In sharp contrast to the existing studies on univariate time series, we consider the more general multivariate case striving to capture their intriguing relationships. Through our extensive empirical studies using the real world vulnerability data, we have shown that a composite model can effectively capture and preserve long-term dependency between different vulnerability and exploit disclosures. In addition, the paper paves the way for further study on the stochastic perspective of vulnerability proliferation towards building more accurate measures for better cyber risk management as a whole.",
author = "Mingjian Tang and Mamoun Alazab and Yuxiu Luo",
year = "2017",
month = "7",
day = "5",
doi = "10.1109/TBDATA.2017.2723570",
language = "English",
volume = "5",
pages = "317--329",
journal = "IEEE Transactions on Big Data",
issn = "2332-7790",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
number = "3",

}

Big Data for Cybersecurity : Vulnerability Disclosure Trends and Dependencies. / Tang, Mingjian; Alazab, Mamoun; Luo, Yuxiu.

In: IEEE Transactions on Big Data, Vol. 5, No. 3, 05.07.2017, p. 317-329.

Research output: Contribution to journalArticleResearchpeer-review

TY - JOUR

T1 - Big Data for Cybersecurity

T2 - Vulnerability Disclosure Trends and Dependencies

AU - Tang, Mingjian

AU - Alazab, Mamoun

AU - Luo, Yuxiu

PY - 2017/7/5

Y1 - 2017/7/5

N2 - Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised attacks will increasingly be crafted to exploit vulnerabilities and weaknesses. With the ever-increasing trend of cybercrime and incidents due to these vulnerabilities, effective vulnerability management is imperative for modern organisations regardless of their size. However, organisations struggle to manage the sheer volume of vulnerabilities discovered on their networks. Moreover, vulnerability management tends to be more reactive in practice. Rigorous statistical models, simulating anticipated volume and dependence of vulnerability disclosures, will undoubtedly provide important insights to organisations and help them become more proactive in the management of cyber risks. By leveraging the rich yet complex historical vulnerability data, our proposed novel and rigorous framework has enabled this new capability. By utilising this sound framework, we initiated an important study on not only handling persistent volatilities in the data but also further unveiling multivariate dependence structure amongst different vulnerability risks. In sharp contrast to the existing studies on univariate time series, we consider the more general multivariate case striving to capture their intriguing relationships. Through our extensive empirical studies using the real world vulnerability data, we have shown that a composite model can effectively capture and preserve long-term dependency between different vulnerability and exploit disclosures. In addition, the paper paves the way for further study on the stochastic perspective of vulnerability proliferation towards building more accurate measures for better cyber risk management as a whole.

AB - Complex Big Data systems in modern organisations are progressively becoming attack targets by existing and emerging threat agents. Elaborate and specialised attacks will increasingly be crafted to exploit vulnerabilities and weaknesses. With the ever-increasing trend of cybercrime and incidents due to these vulnerabilities, effective vulnerability management is imperative for modern organisations regardless of their size. However, organisations struggle to manage the sheer volume of vulnerabilities discovered on their networks. Moreover, vulnerability management tends to be more reactive in practice. Rigorous statistical models, simulating anticipated volume and dependence of vulnerability disclosures, will undoubtedly provide important insights to organisations and help them become more proactive in the management of cyber risks. By leveraging the rich yet complex historical vulnerability data, our proposed novel and rigorous framework has enabled this new capability. By utilising this sound framework, we initiated an important study on not only handling persistent volatilities in the data but also further unveiling multivariate dependence structure amongst different vulnerability risks. In sharp contrast to the existing studies on univariate time series, we consider the more general multivariate case striving to capture their intriguing relationships. Through our extensive empirical studies using the real world vulnerability data, we have shown that a composite model can effectively capture and preserve long-term dependency between different vulnerability and exploit disclosures. In addition, the paper paves the way for further study on the stochastic perspective of vulnerability proliferation towards building more accurate measures for better cyber risk management as a whole.

U2 - 10.1109/TBDATA.2017.2723570

DO - 10.1109/TBDATA.2017.2723570

M3 - Article

VL - 5

SP - 317

EP - 329

JO - IEEE Transactions on Big Data

JF - IEEE Transactions on Big Data

SN - 2332-7790

IS - 3

ER -