City Research Online

Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers

Movahedi, Y., Cukier, M., Andongabo, A. & Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing, 101(2), pp. 139-160. doi: 10.1007/s00607-018-0663-0


Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) and web browsers they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function of vulnerabilities by relaxing the monotonic intensity function assumption, which is prevalent among the studies that use software reliability models (SRMs) and nonhomogeneous Poisson process (NHPP) in modeling. We applied our approach to the vulnerabilities of four OSs (Windows, Mac, IOS, and Linux) and four web browsers (Internet Explorer, Safari, Firefox, and Chrome). Out of the total eight OSs and web browsers we analyzed using a power-law model issued from a family of SRMs, the model was statistically adequate for modeling in six cases. For these cases, in terms of estimation and forecasting capability, our results, compared to a power-law model without clustering, are more accurate in all cases but one.

Publication Type: Article
Additional Information: © The Author(s) 2019. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Publisher Keywords: Vulnerability assessment, Nonhomogeneous Poisson process, Clustering, Software reliability models, Software reliability growth, Security growth models
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Departments: School of Science & Technology > Computer Science
SWORD Depositor:
[thumbnail of VoR Cluster-based vulnerability assessment of operating systems and web browsers.pdf]
Text - Published Version
Available under License Creative Commons Attribution.

Download (1MB) | Preview


Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email


Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login