Assessment of Software Vulnerabilities using Best-Worst Method and Two-Way Analysis

Software is one of the most essential part in today’s world, with its requirements in every industry be it automotive, avionics, telecommunication, banking, pharmaceutical and many more. Software systems are generally a bit complicated and created by distinct programmers. Usually any mistake in the code by a programmer in the developing stage of a software can lead to loopholes that cause vulnerabilities. Vulnerability is a software flaw that an assaulter can exploit to conduct unlawful activities within a computer system. Despite the understanding of vulnerabilities by the academia and industry, the amount of vulnerabilities is growing exponentially as fresh characteristics are added to the software frequently. Developers and testers are faced with the challenge of fixing large amounts of vulnerabilities within limited resources and time. Thus, prioritizing software vulnerabilities is essential to reduce the usage of corporate assets and time, which is the motivation behind the present study. In the present paper, the issue of software vulnerability prioritization is addressed by utilizing a new multi-criterion decision-making (MCDM) technique known as the Best Worst method (BWM). Further, to assess the vulnerabilities in terms of their critical nature, we have applied Two-Way assessment technique. The BWM utilizes two pairwise comparison vectors to determine the weights of criteria. The twoway assessment framework takes into account the perspectives of both managers/developers and stakeholders/testers to highlight the severity of software vulnerabilities. This can act as a significant measure of efficiency and effectiveness for the prioritization and evaluation of vulnerability. The findings are validated with a software testing firm from North India. KeywordsSoftware vulnerability, Multi-criteria decision making (MCDM), Best worst method (BWM), Two-way assessment technique.

[1]  J. Rezaei Best-worst multi-criteria decision-making method: Some properties and a linear model , 2016 .

[2]  Danny Bradbury Secunia: More work needed on patching , 2009 .

[3]  P. K. Kapur,et al.  User-dependent vulnerability discovery model and its interdisciplinary nature , 2017, INFOCOM 2017.

[4]  Ritu Sibal,et al.  Software Vulnerability Prioritization: A Comparative Study Using TOPSIS and VIKOR Techniques , 2018, System Performance and Management Analytics.

[5]  Yeali S. Sun,et al.  A novel approach to evaluate software vulnerability prioritization , 2013, J. Syst. Softw..

[6]  Willy Jimenez,et al.  Software Vulnerabilities , Prevention and Detection Methods : A Review 1 , 2009 .

[7]  Jyoti Dhingra Darbari,et al.  Environmental management partner selection for reverse supply chain collaboration: A sustainable approach. , 2019, Journal of environmental management.

[8]  Ramayya Krishnan,et al.  An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure , 2010, Inf. Syst. Res..

[9]  P. C. Jha,et al.  Software Reliability Assessment with OR Applications , 2011 .

[10]  Ritu Sibal,et al.  Prioritizing software vulnerability types using multi-criteria decision-making techniques , 2017 .

[11]  P. K. Kapur,et al.  Utility Based Tool to Assess Overall Effectiveness of HRD Instruments , 2017 .

[12]  Yuqing Zhang,et al.  Improving VRSS-based vulnerability prioritization using analytic hierarchy process , 2012, J. Syst. Softw..

[13]  Karen Scarfone,et al.  Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.

[14]  Suzanne D. Pawlowski,et al.  The Delphi method as a research tool: an example, design considerations and applications , 2004, Inf. Manag..

[15]  D. Damodaran,et al.  Severity measure of issues creating vulnerabilities in websites using two way assessment technique , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).

[16]  P. K. Kapur,et al.  Measuring software testing efficiency using two-way assessment technique , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.

[17]  P. K. Kapur,et al.  Critical success factor utility based tool for ERP health assessment: a general framework , 2014, Int. J. Syst. Assur. Eng. Manag..

[18]  J. Rezaei Best-worst multi-criteria decision-making method , 2015 .

[19]  Michael R. Lyu,et al.  Handbook of software reliability engineering , 1996 .

[20]  Yuqing Zhang,et al.  VRSS: A new system for rating and scoring vulnerabilities , 2011, Comput. Commun..