Home Mathematics Chapter 11 Discovery and fixation process for software vulnerabilities: modeling and analysis incorporating learning functions
Chapter
Licensed
Unlicensed Requires Authentication

Chapter 11 Discovery and fixation process for software vulnerabilities: modeling and analysis incorporating learning functions

  • Asha Yadav , Ompal Singh , Adarsh Anand and Shinji Inoue
Become an author with De Gruyter Brill

Abstract

This study proposes a comprehensive multiphase mathematical model for vulnerability detection and effective patch management. The model adapts the learning factor concept to model these processes distinctly. In Phase 1, vulnerability detection is modeled as a function of the remaining undetected vulnerabilities along with learning of detection, while in Phase 2, vulnerability fixation is modeled using a logistic learning function. The model’s flexibility is demonstrated through its alignment with various existing models such as Rescorla’s vulnerability discovery model and other vulnerability and patch-related models available in the literature. Real-life patch data from Linux kernel and Windows 10 validate the model, showing its predictive power and accuracy.

Abstract

This study proposes a comprehensive multiphase mathematical model for vulnerability detection and effective patch management. The model adapts the learning factor concept to model these processes distinctly. In Phase 1, vulnerability detection is modeled as a function of the remaining undetected vulnerabilities along with learning of detection, while in Phase 2, vulnerability fixation is modeled using a logistic learning function. The model’s flexibility is demonstrated through its alignment with various existing models such as Rescorla’s vulnerability discovery model and other vulnerability and patch-related models available in the literature. Real-life patch data from Linux kernel and Windows 10 validate the model, showing its predictive power and accuracy.

Chapters in this book

  1. Frontmatter I
  2. Preface VII
  3. Acknowledgments IX
  4. Contents XI
  5. Editors’ biography XV
  6. List of contributing authors XVII
  7. Chapter 1 Cloud-enabled HAP for next-generation reliable networks: a dependability analysis 1
  8. Chapter 2 Opportunity-based age replacement models in discrete time and their application 25
  9. Chapter 3 An efficient GA-PSO algorithm for addressing multi-objective reliability optimization problems 47
  10. Chapter 4 Mathematical data models for forecasting computational resources in cloud computing 65
  11. Chapter 5 Mathematical modeling and reliability analysis of pulsed GTAW process in mechanical property for weld joints 87
  12. Chapter 6 Analyzing enablers influencing reliability and adoption of conversational bots: an interpretive structural modeling technique 101
  13. Chapter 7 Modeling of series parallel system by two types of repairs for reliability perspective 129
  14. Chapter 8 Analyzing unmanned aerial vehicle threats and risks using STRIDE and DREAD 143
  15. Chapter 9 Reliability analysis of a two out of four stochastic model with rework strategy 183
  16. Chapter 10 A fast algorithm to find the maximum reliability route in stochastic networks 209
  17. Chapter 11 Discovery and fixation process for software vulnerabilities: modeling and analysis incorporating learning functions 221
  18. Chapter 12 Reliability assessment method based on cyclic noisy fault big data and AI for OSS 237
  19. Chapter 13 MEREC-CoCoSo-based systematic approach to analyze and evaluate critical testing coverage measures for software development process 257
  20. Chapter 14 The impact of mediator and observer design patterns on software reliability: an empirical evaluation 277
  21. Chapter 15 Identifying the most efficient vulnerability detection methods: a multi-criteria decisionmaking approach 295
  22. Chapter 16 Methodology of developing mathematical models with fuzzy logic elements for quality indices control 307
  23. Chapter 17 Review of multi-release software reliability growth modeling framework 339
  24. Index 353
Downloaded on 21.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/9783111476100-011/html?lang=en
Scroll to top button