Araştırma Makalesi

Modeling Android Security Vulnerabilities: Insights from Statistical Distributions

Cilt: 8 Sayı: 2 30 Aralık 2024
PDF İndir
EN TR

Modeling Android Security Vulnerabilities: Insights from Statistical Distributions

Öz

Android operating system is a mobile operating system that supports multimedia features. Android offers a wide range of applications and integrated features for playing, recording, editing and sharing audio, video, images and other multimedia content. Most Android devices include cameras, speakers, microphones, and other multimedia components. In software security, vulnerabilities are critical concerns that often emerge during software development. Predicting these vulnerabilities post-release is essential for risk assessment and mitigation. While various models have been explored, the Android operating system remains relatively uncharted. This study delves into modeling Android security vulnerabilities using different statistical distributions, comparing their suitability to the widely-used Alhazmi-Malaiya Logistic (AML) model. Data from the National Vulnerability Database (NVD) spanning 2016 to 2018, along with Common Vulnerability Scoring System (CVSS) scores, was analyzed. The study evaluates several distribution models, including Logistic, Weibull, Nakagami, Gamma, and Log-logistic, for monthly vulnerability counts and average monthly impact values. Goodness-of-fit tests and information criteria were applied for model robustness assessment. The findings offer valuable insights for researchers and Android software developers, aiding prediction, risk assessment, resource allocation, and research direction. Logistic and Nakagami distributions emerged as the best-fit models for average monthly impact values and monthly vulnerability counts, respectively. Finally, statistical methods perform better against known artificial intelligence methods for small data sets or more clearly defined data due to their flexible features such as comprehensibility, amount of data, need for calculation, and data independence.

Anahtar Kelimeler

Kaynakça

  1. Ahmad, M. I., Sinclair, C. D. and Werritty, A., 1988, Log-Logistic Flood Frequency Analysis, Journal Of Hydrology, 98 (3), 205-224.
  2. Akaike, H., 1974, A New Look At The Statistical Model Identification, Ieee Transactions On Automatic Control, 19 (6), 716-723.
  3. Alhazmi, O., Malaiya, Y. Ve Ray, I., 2005, Security Vulnerabilities In Software Systems: A Quantitative Perspective, Data And Applications Security Xix, Berlin, Heidelberg, 281-294.
  4. Alhazmi, O. H. and Malaiya, Y. K., 2005a, Modeling The Vulnerability Discovery Process, 16th Ieee International Symposium On Software Reliability Engineering (Issre'05), Ten Pp.-138.
  5. Alhazmi, O. H. and Malaiya, Y. K., 2005b, Quantitative Vulnerability Assessment Of Systems Software, Annual Reliability And Maintainability Symposium, 2005. Proceedings, 615-620.
  6. Alhazmi, O. H. and Malaiya, Y. K., 2006a, Measuring And Enhancing Prediction Capabilities Of Vulnerability Discovery Models For Apache And Iis Http Servers, 17th International Symposium On Software Reliability Engineering, 343-352.
  7. Alhazmi, O. H. and Malaiya, Y. K., 2006b, Prediction Capabilities Of Vulnerability Discovery Models, Rams '06. Annual Reliability And Maintainability Symposium, 2006., 86-91.
  8. Alhazmi, O. H., Malaiya, Y. K. and Ray, I., 2007, Measuring, Analyzing And Predicting Security Vulnerabilities In Software Systems, Computers & Security, 26 (3), 219-228.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Sistem ve Ağ Güvenliği, Siber Güvenlik ve Gizlilik (Diğer)

Bölüm

Araştırma Makalesi

Erken Görünüm Tarihi

30 Ekim 2024

Yayımlanma Tarihi

30 Aralık 2024

Gönderilme Tarihi

31 Temmuz 2024

Kabul Tarihi

5 Eylül 2024

Yayımlandığı Sayı

Yıl 2024 Cilt: 8 Sayı: 2

Kaynak Göster

APA
Gencer, K., & Basciftci, F. (2024). Modeling Android Security Vulnerabilities: Insights from Statistical Distributions. International Journal of Management Information Systems and Computer Science, 8(2), 110-126. https://doi.org/10.33461/uybisbbd.1524207
AMA
1.Gencer K, Basciftci F. Modeling Android Security Vulnerabilities: Insights from Statistical Distributions. UYBİSBBD. 2024;8(2):110-126. doi:10.33461/uybisbbd.1524207
Chicago
Gencer, Kerem, ve Fatih Basciftci. 2024. “Modeling Android Security Vulnerabilities: Insights from Statistical Distributions”. International Journal of Management Information Systems and Computer Science 8 (2): 110-26. https://doi.org/10.33461/uybisbbd.1524207.
EndNote
Gencer K, Basciftci F (01 Aralık 2024) Modeling Android Security Vulnerabilities: Insights from Statistical Distributions. International Journal of Management Information Systems and Computer Science 8 2 110–126.
IEEE
[1]K. Gencer ve F. Basciftci, “Modeling Android Security Vulnerabilities: Insights from Statistical Distributions”, UYBİSBBD, c. 8, sy 2, ss. 110–126, Ara. 2024, doi: 10.33461/uybisbbd.1524207.
ISNAD
Gencer, Kerem - Basciftci, Fatih. “Modeling Android Security Vulnerabilities: Insights from Statistical Distributions”. International Journal of Management Information Systems and Computer Science 8/2 (01 Aralık 2024): 110-126. https://doi.org/10.33461/uybisbbd.1524207.
JAMA
1.Gencer K, Basciftci F. Modeling Android Security Vulnerabilities: Insights from Statistical Distributions. UYBİSBBD. 2024;8:110–126.
MLA
Gencer, Kerem, ve Fatih Basciftci. “Modeling Android Security Vulnerabilities: Insights from Statistical Distributions”. International Journal of Management Information Systems and Computer Science, c. 8, sy 2, Aralık 2024, ss. 110-26, doi:10.33461/uybisbbd.1524207.
Vancouver
1.Kerem Gencer, Fatih Basciftci. Modeling Android Security Vulnerabilities: Insights from Statistical Distributions. UYBİSBBD. 01 Aralık 2024;8(2):110-26. doi:10.33461/uybisbbd.1524207