predicting zero-day software vulnerabilities through data mining

29
PREDICTING ZERO-DAY SOFTWARE VULNERABILITIES THROUGH DATA MINING Su Zhang Department of Computing and Information Science Kansas State University 1

Upload: kimi

Post on 25-Feb-2016

33 views

Category:

Documents


0 download

DESCRIPTION

Predicting zero-day software vulnerabilities through data mining. Su Zhang Department of Computing and Information Science Kansas State University. Outline. Motivation. Related work. Proposed approach. Possible techniques. Plan. Outline. Motivation. Related work. Proposed approach. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Predicting zero-day software vulnerabilities through data mining

1

PREDICTING ZERO-DAY SOFTWARE VULNERABILITIES THROUGH DATA MINING

Su ZhangDepartment of Computing and Information ScienceKansas State University

Page 2: Predicting zero-day software vulnerabilities through data mining

2

OUTLINE Motivation. Related work. Proposed approach. Possible techniques. Plan.

Page 3: Predicting zero-day software vulnerabilities through data mining

3

OUTLINE Motivation. Related work. Proposed approach. Possible techniques. Plan.

Page 4: Predicting zero-day software vulnerabilities through data mining

4

THE TREND OF VULNERABILITY NUMBERS

Page 5: Predicting zero-day software vulnerabilities through data mining

5

ZERO-DAY VULNERABILITY

What is zero-day vulnerability? It is a vulnerability which is found by underground hackers

before being made public.

Increasing threat from zero-day vulnerabilities. Many attacks are attributed to zero-day vulnerabilities. E.g. in 2010 Microsoft confirmed a vulnerability in Internet

Explorer, which affected some versions that were released in 2001.

Page 6: Predicting zero-day software vulnerabilities through data mining

6

OUR GOAL Risk awareness. The possibility of zero-day

vulnerability must be considered for comprehensive risk assessment for enterprise networks.

Page 7: Predicting zero-day software vulnerabilities through data mining

7

ENTERPRISE RISK ASSESSMENT FRAMEWORK

Page 8: Predicting zero-day software vulnerabilities through data mining

8

ENTERPRISE RISK ASSESSMENT FRAMEWORK

Page 9: Predicting zero-day software vulnerabilities through data mining

9

ENTERPRISE RISK ASSESSMENT FRAMEWORK

Page 10: Predicting zero-day software vulnerabilities through data mining

10

ENTERPRISE RISK ASSESSMENT FRAMEWORK

Page 11: Predicting zero-day software vulnerabilities through data mining

11

ENTERPRISE RISK ASSESSMENT FRAMEWORK

Page 12: Predicting zero-day software vulnerabilities through data mining

12

PROBLEMPredict the information of zero – day vulnerabilities from software configurations.

Page 13: Predicting zero-day software vulnerabilities through data mining

13

OUTLINE Motivation. Related work. Proposed approach. Possible techniques. Plan.

Page 14: Predicting zero-day software vulnerabilities through data mining

14

RELATED WORK

O. H. Alhazmi and Y. K. Malaiya, 2005.

Andy Ozment, 2007.

Kyle Ingols, et al, 2009.

Miles A. McQueen, et al, 2009.

Page 15: Predicting zero-day software vulnerabilities through data mining

15

OUTLINE Motivation. Related work Proposed approach. Possible techniques. Plan.

Page 16: Predicting zero-day software vulnerabilities through data mining

16

PROPOSED APPROACH Predict the likelihood of zero-day

vulnerabilities for specific software applications.

NVD Available since 2002. Rich data source including the preconditions and

consequences of vulnerabilities. It could be used to build our model and validate our work.

Page 17: Predicting zero-day software vulnerabilities through data mining

17

SYSTEM ARCHITECTURE

IE WinXP FireFox …

Target Machine

Scanner (e.g. Nessus or OVAL)

Our Prediction Model

Output(MTTNV&CVSS Metrics)

CPE (common platform enumeration)

Page 18: Predicting zero-day software vulnerabilities through data mining

18

PREDICTION MODEL

Predictive data: CPE (common platform enumeration) Indicate software configuration on a host.

Predicted data: MTTNV (Mean Time to Next

Vulnerability) & CVSS Metrics MTTNV indicates the probability of zero-day

vulnerabilities. CVSS metrics indicate the properties of the

predicted vulnerabilities.

Page 19: Predicting zero-day software vulnerabilities through data mining

19

CPE (COMMON PLATFORM ENUMERATION) What is CPE?

CPE is a structured naming scheme for information technology systems, software, and packages.

Example (in primitive format) cpe:/a:acme:product:1.0:update2:pro:en-us Professional edition of the "Acme Product 1.0

Update 2 English".

Page 20: Predicting zero-day software vulnerabilities through data mining

20

CPE LANGUAGE

Page 21: Predicting zero-day software vulnerabilities through data mining

21

CVSS (COMMON VULNERABILITY SCORING SYSTEM ) An open framework for communicating the

characteristics and impacts of IT vulnerabilities.

Metric Vector access complexity (H, M, L) authentication ( R, NR) confidentiality (N, P, C) ...

CVSS Score: Calculated based on above vector. It indicates the severity of a vulnerability.

Page 22: Predicting zero-day software vulnerabilities through data mining

22

CVSS USED IN RISK ASSESSMENT We use CVSS to derive a conditional

probability. How likely a vulnerability could be successfully exploited, given all preconditions fulfilled.

By combining the conditional probability with attack graph one can calculate the cumulative probability, we could obtain a overall estimated likelihood of the given machine being compromised.

Page 23: Predicting zero-day software vulnerabilities through data mining

23

OUTLINE Motivation. Related work. Proposed approach. Possible techniques. Plan.

Page 24: Predicting zero-day software vulnerabilities through data mining

24

POSSIBLE TECHNIQUES Linear Regression ( input are continuous

variables).

Statistical classification (input are discrete variables).

Maximum likelihood and least squares (Determining the parameters of our model).

Page 25: Predicting zero-day software vulnerabilities through data mining

25

VALIDATION METHODOLOGY

Earlier years of NVD: Building our model.

Later years of NVD: Validate our model.

Criteria: Closer to the factual value than without considering zero-day vulnerabilities.

Page 26: Predicting zero-day software vulnerabilities through data mining

26

OUTLINE Motivation. Related work. Proposed approach. Possible techniques. Plan.

Page 27: Predicting zero-day software vulnerabilities through data mining

27

PLAN Next phase: Study data-mining tools (e.g.

Support Vector Machine) . Then build up our prediction model. Validate the model on NVD.

Final phase: If the previous phase provides a good model, we

will incorporate the generated result into MulVAL. Otherwise, we are going to investigate the

problem.

Page 28: Predicting zero-day software vulnerabilities through data mining

28

REFERENCES [1]Andrew Buttner et al, ”Common Platform Enumeration (CPE) –

Specification,” 2008. [2]NVD, http://nvd.nist.gov/home.cfm. [3]O. H. Alhazmi et al, “Modeling the Vulnerability Discovery Process,”

2005. [4]Omar H. Alhazmi et al, “Prediction Capabilities of Vulnerability

Discovery Models,” 2006. [5]Andy Ozment, “Improving Vulnerability Discovery Models,” 2007. [6]R. Gopalakrishna and E. H. Spafford, “A trend analysis of

vulnerabilities,” 2005. [7]Christopher M. Bishop, “Pattern Recognition andMachine Learning,”

2006. [8]Xinming Ou et al, “MulVAL: A logic-based network security analyzer,”

2005. [9] Kyle Ingols et al, “Modeling Modern Network Attacks and

Countermeasures Using Attack Graphs” 2009. [10] Miles A. McQueen et al, “Empirical Estimates and Observations of

0Day Vulnerabilities,” 2009. [11] Alex J. Smola et al, “A Tutorial on Support Vector Regression,” 1998.

Page 29: Predicting zero-day software vulnerabilities through data mining

29

THANK YOU!

Questions & Answers