Common Vulnerabilities and Exposures Project Report
Common Vulnerabilities and Exposures Project Report
Project Report
(January April 2015)
Rishi Ramawat
11201887
CSE308
Section: K1208
Under the Guidance of
Ms Maneet Kaur
DECLARATION
Date:
Registration No. 11201887
Signature:
RISHI RAMAWAT
Acknowledgement
This project consumed huge amount of work, research and dedication. Still, implementation
would not have been possible if I did not have a support of many individuals and organizations.
Therefore I would like to extend my sincere gratitude to all of them. First of all I am thankful
to Lovely Professional University for their logistical support and for providing necessary guidance
concerning projects implementation.
I am highly indebted to my Supervisor and Mentor on this Project Ms Maneet Kaur for
provision of expertise, and guidance in the implementation. Without her superior knowledge and
experience, the Project would lack in quality of outcomes, and thus her support has been essential.
Nevertheless, I express my gratitude towards my family and colleagues for their kind cooperation and encouragement which help me in completion of this project.
Index
CONTENTS
Page No.
1. Introduction . 1
2. Scope of the Project .... 2
3. About CVEs ... 3
4. Data Collection ... 5
5. Pre-Processing of dataset 6
6. Analysis Performed . 7
7. References . 17
INTRODUCTION
This Project is based on Information Security. The aim of this Project is to analyse the data
collected on the Common Vulnerabilities and Exposures (CVE).
Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly
known information security vulnerabilities and exposures in publicly released software packages.
MITRE Corporation maintains the system, with funding from the National Cyber Security Division
of the United States Department of Homeland Security.
CVE is used by the Security Content Automation Protocol, and CVE IDs are listed on MITRE's
system as well as the US National Vulnerability Database.
This project would help in analysing the Security Vulnerabilities released since 1999 till date.
It would answer many questions like which kind of vulnerability has been the most dangerous
and which kind of vulnerability has been the most common in the publicly released software
packages.
It would also help us in finding and analysing the total number of vulnerabilities found yet in
the software products used frequently by people in daily life.
About CVEs
Below are the CVE Initiatives definitions of the terms "Vulnerability" and "Exposure":
Vulnerability
An information security "vulnerability" is a mistake in software that can be directly used by a hacker
to gain access to a system or network.
CVE considers a mistake a vulnerability if it allows an attacker to use it to violate a reasonable
security policy for that system (this excludes entirely "open" security policies in which all users are
trusted, or where there is no consideration of risk to the system).
For CVE, a vulnerability is a state in a computing system (or set of systems) that either:
allows an attacker to access data that is contrary to the specified access restrictions for that
data
denial of service problems that allow an attacker to cause a Blue Screen of Death
CVE considers a configuration issue or a mistake an exposure if it does not directly allow compromise
but could be an important component of a successful attack, and is a violation of a reasonable security
policy.
An "exposure" describes a state in a computing system (or set of systems) that is not a vulnerability,
but either:
is a primary point of entry that an attacker may attempt to use to gain access to the system or
data
running services such as finger (useful for information gathering, though it works as
advertised)
running services that are common attack points (e.g., HTTP, FTP, or SMTP)
use of applications or services that can be successfully attacked by brute force methods (e.g.,
use of trivially broken encryption, or a small key space)
Vulnerability Management
Patch Management
Vulnerability Alerting
Intrusion Detection
Data Collection
The data can be collected by two ways they are through the primary and secondary way. The primary
way involves manual collection of the data from the processes like surveys, etc. whereas the
secondary process involves the collection of the data from the sources like internet, organization and
clubs etc. I have collected data from the internet through a website that provides the complete security
vulnerability data source.
The Dataset has 68,480 rows and 14 Columns.
Pre-Processing of Dataset
The data collected did not require any Major Transformations as it was analysis ready.
A few Transformations which were performed are as follows:
1. The dates present in the database were in the following format which were less easier for the
eyes to read
2. The Column CWE-ID was deleted as it did not contain any useful Information for Analysis
3. The top Row i.e. the Label Pane was froze so as to allow the users Easier Readability of such
a large dataset.
Analysis Performed
1. Total Number of Vulnerabilities Categorised by Type of Vulnerability
a. Functions Used:
i. COUNTIF()
b. Excel features used: The Excel Charts feature has been used to draw a column chart
c. Snapshots:
Figure: Column Chart displaying the No. of Security Vulnerabilities found each year
Figure: The Dataset showing the No. of Security vulnerabilities found in each year
d. Conclusion: The analysis shows that the highest No. of Security Vulnerabilities were
recorded in the year 2014.
d. Conclusion: The analysis shows that the Weighted Average CVSS Score is 6.33(Approx.)
Figure: The Dashboard displaying yearly recordings of XSS, Execute Code and Total
Vulnerabilities
d. Conclusion: An user-friendly and interactive dashboard has been developed displaying
year-wise distribution of each vulnerability
Figure: The Data Table showing the CVSS Score distribution of Top 50 Products
Figure: The Table Generated using the previous data showing the Total No. Of Vulnerabilities
in Softwares developed by these Vendors
Figure: Column chart displaying the Total No. Of Vulnerabilities in Softwares developed by
these Vendors
d. Conclusion: The Analysis shows that the Softwares Releases by Microsoft Corporation and
Apple Inc. have the highest Number of vulnerabilities
Figure: The Data Table showing the CVSS Score distribution of Top 50 Vendors
Figure: The Details of Corresponding CVE-ID being displayed by searching in the DataSet
REFERENCES
http://www.cvedetails.com/
https://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
www.excel-easy.com/functions.html
http://www.excelfunctions.net/