Vulnerabilities Forecasting Tool

Coordinated by
UTC

The Vulnerabilities Forecasting Tool (VFT) provides historical vulnerability data and projections for time intervals of 1, 2, 3, 6, and 12 months for several major software components. Based on historical vulnerability data and future predictions, designers can make informed decisions regarding the selection of the system’s underlying components, optimizing for both functionality and security. The frequency of discovered vulnerabilities also serves as an indicator of the level of attention that should be paid to periodic updates and patches.

Description

Describe the innovation content of the result:
VFT uses advanced algorithms to predict the expected number of vulnerabilities that will be discovered within specific timeframes. It focuses on forecasting vulnerabilities across various software products, specifically targeting operating systems, database management servers, and web servers. It provides valuable information on potential security flaws that may occur in these categories of software. The tool’s accurate predictions help proactively manage risk, allowing organizations to allocate appropriate resources and prioritize their security efforts effectively.
Who will be the customer?
Software developers, IT security teams, system administrators, risk management professionals and security auditors/consultants
What benefit will it bring to the customers?
It enables proactive risk management, resource optimization, improved security measures, informed decision-making and improved compliance and audit processes.
When is the expected date of achievement in the project (Mth/yr)?
Month 30.
When is the time to market (Mth/yr)?
At the end of the project.
What are the costs to be incurred after the project and before exploitation?

Hosting costs and probably further developments and maintenance.
What is the approximate price range of this result/price of licences?
The usage of the product is free of charge.
What are the market size in Millions € for this result and relevant trend?
N/A
How will this result rank against competing products in terms of price/performance?
To our best knowledge, there is no similar product on the market.
Who are the competitors for this result?
No known competitors.
How fast and in what ways will the competition respond to this result?
Unknown at the moment.
Who are the partners involved in the result?
UTC
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
ICT GW, 7Bulls, IFEVS
Have you protected or will you protect this result? How? When?
VFT was presented at CISIS-ICEUTE 2022. The extended contribution was submitted to Logic Journal of the IGPL.

Other results

ResilBlockly

This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This