About This Research¶
Researcher Profile¶
Academic Profile
Eid ALBADDAH
PhD Candidate in Cybersecurity
City St George's, University of London
Department of Computer Science
Academic Journey¶
I am currently pursuing a Doctor of Cybersecurity degree, focusing on the complex dynamics of vulnerability lifecycles across modern software ecosystems. My research sits at the intersection of security economics, data science, and empirical software engineering, providing quantitative insights into how vulnerabilities are discovered, exploited, and patched across different vendor environments.
Research Philosophy
My approach to cybersecurity research is fundamentally data-driven and empirical. Rather than relying solely on theoretical frameworks, I believe in extracting insights from real-world security data to understand the actual dynamics of vulnerability management. This methodology enables evidence-based recommendations for both defensive strategies and policy development.
Research Evolution¶
Focus: Establishing the Research Framework
During the initial phase of my PhD, I focused on building a solid foundation for vulnerability lifecycle analysis:
- Literature Review: Comprehensive analysis of existing security econometrics research, particularly building upon Stefan Frei's seminal 2009 work
- Microsoft Ecosystem Focus: Deep dive into Microsoft vulnerability patterns to establish baseline methodologies
- Tool Development: Creation of initial data collection and analysis frameworks
- Transfer Report: Successful completion demonstrating research viability and preliminary findings
Key Milestone
Transfer report approval, validating the research approach and establishing the foundation for expanded analysis.
Focus: Multi-Vendor Ecosystem Analysis
The current phase represents a significant expansion in both scope and sophistication:
- Data Integration: Incorporation of multiple vendor sources (Microsoft, Red Hat, Cisco) and community datasets (GitHub, MoreFixes)
- Methodological Enhancement: Implementation of advanced statistical techniques including survival analysis and heavy-tailed distribution modeling
- Temporal Extension: Dataset expansion to include vulnerabilities through May 2025
- Cross-Ecosystem Comparison: Development of frameworks for comparing commercial vs. open source vulnerability management
Current Status
Active conference paper preparation and advanced modeling development.
Focus: Predictive Frameworks and Thesis Completion
The final phase will focus on synthesizing insights into actionable frameworks:
- Machine Learning Integration: Development of exploit prediction and patch prioritization models
- Policy Implications: Translation of research findings into actionable security policy recommendations
- Industry Validation: Collaboration with industry partners to validate research findings
- Thesis Completion: Integration of all research components into a comprehensive thesis
Research Impact Metrics¶
graph LR
A[Research Data] --> B[280K+ CVEs]
A --> C[50K+ Exploits]
A --> D[75K+ Patches]
A --> E[26+ Years Coverage]
B --> F[Analysis & Insights]
C --> F
D --> F
E --> F
F --> G[Academic Impact]
F --> H[Industry Applications]
F --> I[Policy Recommendations]
style A fill:#e1f5fe
style F fill:#f3e5f5
style G fill:#e8f5e8
style H fill:#fff3e0
style I fill:#fce4ec Core Research Questions¶
Primary Research Questions¶
1. Lifecycle Dynamics
How do vulnerability lifecycles differ across commercial and open source ecosystems, and what factors drive these differences?
2. Temporal Patterns
What patterns exist in the "race" between exploit development and patch deployment, and how have these patterns evolved over time?
3. Predictive Capability
Can we reliably predict which vulnerabilities will be exploited based on their characteristics, vendor ecosystem, and temporal context?
4. Resource Optimization
How should organizations prioritize patch deployment to maximize security impact given limited resources?
Secondary Research Questions¶
Secondary Focus Areas
- Weakness Evolution: How do Common Weakness Enumeration (CWE) patterns relate to exploitation likelihood and vendor response times?
- Vendor Comparison: What systematic differences exist between vendor security response patterns, and what drives these differences?
- Economic Factors: How do economic incentives influence vulnerability disclosure, exploitation, and patching behaviors?
- Policy Impact: What policy interventions could improve the overall security ecosystem's response to vulnerabilities?
Dataset Overview¶
pie title Vulnerability Data Sources
"CVE Database" : 280
"Exploit Databases" : 50
"Patch Repositories" : 75
"Vendor APIs" : 45 Methodological Approach¶
Data-Driven Foundation
My research is built on one of the most comprehensive vulnerability datasets assembled for academic research:
- Scale: 280K+ CVEs, 50K+ exploits, 75K+ patches across 26+ years
- Diversity: Multiple vendor ecosystems (commercial and open source)
- Quality: Rigorous validation and quality assurance procedures
- Integration: Systematic ETL processes ensuring data consistency
Analytical Framework¶
- Statistical modeling of temporal patterns
- Machine learning for prediction tasks
- Survival analysis for time-to-event modeling
- Heavy-tailed distribution analysis for security data
- Case study analysis of significant vulnerabilities
- Vendor policy and procedure analysis
- Industry best practice evaluation
Validation Strategy
Research validity is ensured through:
- Temporal validation: Time-series splits to prevent data leakage
- Cross-vendor validation: Consistency checks across different ecosystems
- Industry feedback: Validation with security practitioners
- Peer review: Conference and journal submission processes
Research Impact Timeline¶
gantt
title Research Impact and Milestones
dateFormat YYYY-MM-DD
section Phase 1
Literature Review :done, lit, 2023-01-01,2023-06-01
Transfer Report :done, transfer, 2023-06-01,2024-01-01
section Phase 2
Data Integration :done, data, 2024-01-01,2024-08-01
EDCC 2026 Paper :active, paper, 2024-08-01,2025-12-01
section Phase 3
Advanced Modeling : model, 2025-06-01,2026-12-01
Thesis Completion : thesis, 2026-01-01,2027-06-01 Research Impact and Applications¶
Academic Contributions¶
Methodological Innovation
Development of multi-vendor analysis frameworks for vulnerability research
Empirical Insights
Evidence-based findings about vulnerability lifecycle patterns
Data Resource
Creation of integrated datasets for future security research
Tool Development
Open source tools for vulnerability analysis
Industry Applications¶
| Application Area | Impact | Status |
|---|---|---|
| Risk Assessment | Improved frameworks for vulnerability risk evaluation | ✅ Active |
| Resource Allocation | Evidence-based patch prioritization strategies | ✅ Active |
| Threat Intelligence | Enhanced understanding of exploitation patterns | 🔄 In Progress |
| Policy Development | Data-driven recommendations for security policies | 📋 Planned |
Technical Expertise¶
Programming and Analysis¶
Advanced data analysis, machine learning, statistical modeling
Complex database queries and analytical processing
Statistical analysis and specialized security data modeling
Data visualization and interactive dashboard development
Core Competencies¶
mindmap
root((Technical Skills))
Data Engineering
ETL Development
Database Design
API Integration
Quality Assurance
Security Domain
Vulnerability Assessment
Threat Intelligence
Risk Management
Security Economics
Analysis & Modeling
Statistical Modeling
Machine Learning
Data Visualization
Research Methods Current Projects and Publication Pipeline¶
Conference Paper¶
Upcoming Publication
Multi-Vendor Vulnerability Lifecycle Analysis
- Target Conference: EDCC 2026 (European Dependable Computing Conference)
- Status: Data analysis complete, writing in progress
- Focus: Comparative analysis of vulnerability response across ecosystems
- Expected Submission: Q4 2025
Research Collaborations¶
Active Partnerships
- Industry Partnerships: Collaboration with security vendors for data validation
- Academic Networks: Participation in cybersecurity research communities
- Open Source Contributions: Development of tools for vulnerability research
Professional Development¶
- Presenter: Security research conference presentations
- Reviewer: Peer review activities for security conferences
- Attendee: Regular participation in major cybersecurity conferences
- Teaching: Assistance with undergraduate cybersecurity courses
- Mentoring: Support for junior researchers in security analytics
- Community: Active participation in academic security research community
Future Roadmap¶
timeline
title Research Timeline & Milestones
section 2025
Q1-Q2 : EDCC 2026 Paper Submission
: Industry Validation Partnerships
Q3-Q4 : Advanced Model Development
: Conference Presentations
section 2026
Q1-Q2 : EDCC 2026 Presentation
: Additional Publications
Q3-Q4 : Thesis Writing Phase
: Industry Collaboration Expansion
section 2027
Q1-Q2 : Thesis Completion
: Post-doctoral Planning
Q3-Q4 : Career Transition
: Long-term Research Planning Long-term Vision¶
Career Aspirations
- Academic Career: Pursue faculty position in cybersecurity research
- Industry Impact: Develop practical tools for vulnerability management
- Policy Influence: Contribute to evidence-based cybersecurity policy
- Research Leadership: Lead major research initiatives in security analytics
Research Commitment
This research represents a commitment to improving cybersecurity through rigorous, data-driven analysis and evidence-based recommendations for both academic understanding and practical implementation.