Skip to main content

Software Vulnerability Prioritization: A Comparative Study Using TOPSIS and VIKOR Techniques

  • Chapter
  • First Online:
System Performance and Management Analytics

Part of the book series: Asset Analytics ((ASAN))

Abstract

The ever-mounting existence of security vulnerabilities in a software is an inevitable challenge for organizations. Additionally, developers have to operate within limited budgets while meeting the deadlines. So they need to prioritize their vulnerability responses. In this paper, we propose an approach for vulnerability response prioritization using “closeness to the ideal” approach. We used TOPSIS and VIKOR method in this study. Both of these techniques employ an aggregating function to achieve the ranking of desired alternatives. VIKOR method determines a compromise solution on the basis of measure of closeness to a single ideal solution while TOPSIS method determines a feasible solution while taking into account the shortest distance from the positive ideal solution and the maximum distance from negative ideal solution. Both these methods share some significant similarities and differences. A comparative analysis of these two methods is done by applying them on real-life software vulnerability datasets for achieving vulnerability prioritization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schiffman, M., & Cisco, C. I. A. G. (2005, June). A complete guide to the common vulnerability scoring system (cvss). In Forum Incident Response and Security Teams (http://www.first.org/).

  2. Mell, P., Scarfone, K., & Romanosky, S. (2007, June). A complete guide to the common vulnerability scoring system version 2.0. In Published by FIRST-Forum of Incident Response and Security Teams, Vol. 1, p. 23.

    Google Scholar 

  3. Mell, P., Scarfone, K., & Romanosky, S. (2006). Common vulnerability scoring system. IEEE Security & Privacy, 4(6).

    Google Scholar 

  4. National Vulnerability Database. nvd.nist.gov/ [online], December, 2016.

  5. Liu, Q., & Zhang, Y. (2011). VRSS: A new system for rating and scoring vulnerabilities. Computer Communications, 34(3), 264–273.

    Article  Google Scholar 

  6. Liu, Q., Zhang, Y., Kong, Y., & Wu, Q. (2012). Improving VRSS-based vulnerability prioritization using analytic hierarchy process. Journal of Systems and Software, 85(8), 1699–1708.

    Article  Google Scholar 

  7. Spanos, G., Sioziou, A., & Angelis, L. (2013, September). WIVSS: A new methodology for scoring information systems vulnerabilities. In Proceedings of the 17th Panhellenic Conference on Informatics (pp. 83–90), ACM.

    Google Scholar 

  8. Wang, Y., & Yang, Y. (2012). PVL: A novel metric for single vulnerability rating and its application in IMS. Journal of Computational Information Systems, 8(2), 579–590.

    Google Scholar 

  9. Spanos, G., & Angelis, L. (2015). Impact metrics of security vulnerabilities: Analysis and weighing. Information Security Journal: A Global Perspective, 24(1–3), 57–71.

    Google Scholar 

  10. Sharma, R., & Singh, R. K. (2018). An improved scoring system for software vulnerability prioritization. In Quality, IT and Business Operations (pp. 33–43). Springer, Singapore.

    Google Scholar 

  11. Fruhwirth, C., & Mannisto, T. (2009) Improving CVSS-based vulnerability prioritization and response with context information. In Proceedings of the 2009 3rd international Symposium on Empirical Software Engineering and Measurement. IEEE Computer Society.

    Google Scholar 

  12. Sibal, R., Sharma, R., & Sabharwal, S. (2017). Prioritizing software vulnerability types using multi-criteria decision-making techniques. Life Cycle Reliability and Safety Engineering, 6(1), 57–67.

    Article  Google Scholar 

  13. Hwang, C. L., & Yoon, K. (1981). Methods for multiple attribute decision making. In Multiple attribute decision making (pp. 58–191). Springer, Berlin, Heidelberg.

    Google Scholar 

  14. Opricovic, S., & Tzeng, G. H. (2004). Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS. European Journal of Operational Research, 156(2), 445–455.

    Article  Google Scholar 

  15. Zeleny, M. (1982). Multiple criteria decision making, McGraw-Hill Book Company.

    Google Scholar 

  16. CVE Details, The ultimate security vulnerability data source. www.cvedetails.com [Online], May 12, 2015.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruchi Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sharma, R., Sibal, R., Sabharwal, S. (2019). Software Vulnerability Prioritization: A Comparative Study Using TOPSIS and VIKOR Techniques. In: Kapur, P., Klochkov, Y., Verma, A., Singh, G. (eds) System Performance and Management Analytics. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-10-7323-6_32

Download citation

Publish with us

Policies and ethics