Repository logo
 
Publication

Risk assessment of vulnerabilities exploitation

datacite.subject.fosCiências Naturais::Ciências da Computação e da Informação
dc.contributor.authorBrilhante, Maria de Fátima
dc.contributor.authorPestana, Pedro Duarte
dc.contributor.authorRocha, Maria Luísa
dc.contributor.authorSequeira, Fernando
dc.contributor.editorHenriques-Rodrigues, L.
dc.contributor.editorMenezes, R.
dc.contributor.editorFaria, S.
dc.date.accessioned2026-01-08T15:16:21Z
dc.date.available2026-01-08T15:16:21Z
dc.date.issued2024
dc.description.abstractUsing the Kolmogorov–Smirnov, Cramér–von Mises and Anderson– Darling tests, and the not so commonly applied Vuong’s test, it is shown that a two components hyperlog-logistic distribution, i.e., a mixture of two geo-max-stable log-logistic distributions, provides a good fit for the time from disclosure to update of vulnerabilities sampled from the CVEdetails.com database. It is also shown that the hyperlog-logistic distribution provides a better fit than a heavy-tailed distribution of maxima, or a log-logistic distribution, or even a heavy-tailed two components hyperexponential distribution. Moreover, ways of incorporating uncertainty and of modeling vulnerabilities lifecycle into the Common Vulnerabilities Scoring System (CVSS), the most widely used score to assess severity of vulnerabilities, are discussed, in order to obtain an improved CVSS calculator and the evolution of a score over time.eng
dc.identifier.citationFátima Brilhante, M., Pestana, P., Luísa Rocha, M., Sequeira, F. (2024). Risk Assessment of Vulnerabilities Exploitation. In: Henriques-Rodrigues, L., Menezes, R., Machado, L.M., Faria, S., de Carvalho, M. (eds) New Frontiers in Statistics and Data Science. Springer Proceedings in Mathematics & Statistics, vol 469. Springer, Cham.
dc.identifier.doi10.1007/978-3-031-68949-9_6
dc.identifier.isbn978-3-031-68949-9
dc.identifier.urihttp://hdl.handle.net/10400.2/20710
dc.language.isoeng
dc.peerreviewedyes
dc.publisherSpringer
dc.rights.uriN/A
dc.subjectVulnerabilities
dc.subjectVulnerability Life-Cycle
dc.subjectHeavy-Tailed Distributions
dc.subjectHyperlog-logistic Distribution
dc.subjectCVSS Modifier
dc.titleRisk assessment of vulnerabilities exploitationeng
dc.typebook part
dspace.entity.typePublication
oaire.citation.endPage82
oaire.citation.startPage70
oaire.citation.titleNew Frontiers in Statistics and Data Science
oaire.citation.volume469
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.affiliation.nameUniversidade Aberta
person.familyNamePestana
person.givenNamePedro Duarte
person.identifier.ciencia-id2714-8A7B-5CCA
person.identifier.orcid0000-0002-3406-1077
person.identifier.ridE-7273-2016
person.identifier.scopus-author-id56074016300
relation.isAuthorOfPublication755592cd-7905-4c94-9eba-1bb83ce10355
relation.isAuthorOfPublication.latestForDiscovery755592cd-7905-4c94-9eba-1bb83ce10355

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Risk-Assessment-of-Vulnerabilities-Exploitation.pdf
Size:
1.12 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.97 KB
Format:
Item-specific license agreed upon to submission
Description: