Repository logo
 
Publication

Measuring the risk of vulnerabilities exploitation

datacite.subject.fosCiências Naturais::Ciências da Computação e da Informação
dc.contributor.authorBrilhante, Maria de Fátima
dc.contributor.authorPestana, Dinis
dc.contributor.authorPestana, Pedro Duarte
dc.contributor.authorRocha, Maria Luísa
dc.date.accessioned2026-01-08T15:23:31Z
dc.date.available2026-01-08T15:23:31Z
dc.date.issued2024
dc.description.abstractModeling the vulnerabilities lifecycle and exploitation frequency are at the core of security of networks evaluation. Pareto, Weibull, and log-normal models have been widely used to model the exploit and patch availability dates, the time to compromise a system, the time between compromises, and the exploitation volumes. Random samples (systematic and simple random sampling) of the time from publication to update of cybervulnerabilities disclosed in 2021 and in 2022 are analyzed to evaluate the goodness-of-fit of the traditional Pareto and log-normal laws. As censoring and thinning almost surely occur, other heavy-tailed distributions in the domain of attraction of extreme value or geo-extreme value laws are investigated as suitable alternatives. Goodness-of-fit tests, the Akaike information criterion (AIC), and the Vuong test, support the statistical choice of log-logistic, a geomax stable law in the domain of attraction of the Fréchet model of maxima, with hyperexponential and general extreme value fittings as runners-up. Evidence that the data come from a mixture of differently stretched populations affects vulnerabilities scoring systems, specifically the common vulnerabilities scoring system (CVSS).eng
dc.identifier.citationBrilhante, M.F., Pestana, D., Pestana, P.D. & Rocha, M.L. (2024). Measuring the Risk of Vulnerabilities Exploitation. AppliedMath, 4(1), 2.
dc.identifier.doi10.3390/ appliedmath4010002
dc.identifier.issn2673-9909
dc.identifier.urihttp://hdl.handle.net/10400.2/20712
dc.language.isoeng
dc.peerreviewedyes
dc.publisherMDPI
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectCybervulnerabilities
dc.subjectCVSS Metrics
dc.subjectVulnerabilities Lifecycle
dc.subjectRisk Management
dc.titleMeasuring the risk of vulnerabilities exploitationeng
dc.typejournal article
dspace.entity.typePublication
oaire.citation.endPage54
oaire.citation.issue1
oaire.citation.startPage20
oaire.citation.titleAppliedMath
oaire.citation.volume4
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.affiliation.nameUniversidade Aberta
person.familyNameBrilhante
person.familyNamePestana
person.givenNameMaria de Fátima
person.givenNamePedro Duarte
person.identifier.ciencia-id2714-8A7B-5CCA
person.identifier.orcid0000-0001-9276-7011
person.identifier.orcid0000-0002-3406-1077
person.identifier.ridE-7273-2016
person.identifier.scopus-author-id56074016300
relation.isAuthorOfPublicationc7d7e495-4415-4e86-9ad6-c142069849c7
relation.isAuthorOfPublication755592cd-7905-4c94-9eba-1bb83ce10355
relation.isAuthorOfPublication.latestForDiscovery755592cd-7905-4c94-9eba-1bb83ce10355

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
appliedmath-04-00002.pdf
Size:
2.22 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.97 KB
Format:
Item-specific license agreed upon to submission
Description: