Organizational Security Resource Estimation via Vulnerability Queueing

This paper introduces a non-stationary queueing framework that accurately estimates an organization's dynamic cyber resources and workforce capacity by analyzing vulnerability and patch timestamps, offering a significant improvement over static attack-surface metrics for predictive risk management.

Original authors: Abdullah Y. Etcibasi, Zachary Dobos, C. Emre Koksal

Published 2026-04-14
📖 5 min read🧠 Deep dive

This is an AI-generated explanation of the paper below. It is not written or endorsed by the authors. For technical accuracy, refer to the original paper. Read full disclaimer

Imagine a massive, chaotic fire station.

Every day, new fires (vulnerabilities) break out in a city (the organization's computer systems). Some are small kitchen fires; some are massive warehouse blazes. The fire department has a team of firefighters (the IT security team) who rush to put them out.

The Problem:
Traditional security managers look at a photo of the fire station taken once a month. They count how many fires are currently burning and say, "We have 50 fires, so we need 50 firefighters."

But this is wrong. Why?

  1. Fires don't start evenly: Sometimes, a whole neighborhood catches fire at once (a "burst"). Other times, it's quiet.
  2. The team changes: The number of firefighters on duty changes. Sometimes they are tired, sometimes they have new equipment, sometimes they are sick.
  3. The backlog: If fires start faster than they can be put out, a "line" of burning buildings grows. This line is the Attack Surface.

The old way of measuring security ignores the line. It doesn't tell you if the fire station is overwhelmed or if they are just waiting for the next fire.

The New Solution: The "Queueing" Detective
This paper introduces a new way to look at the fire station. Instead of taking a photo, the authors treat the fire station like a queue (a line at a coffee shop) that is constantly moving.

They use a clever trick to figure out how many firefighters are actually working and how fast they are working, even if no one ever told them the numbers. They do this by watching the timestamps of when fires start and when they are put out.

Here is how their method works, broken down into simple steps:

1. The "Traffic Jam" Analogy

Think of the unpatched vulnerabilities as cars stuck in traffic.

  • Arrivals: New cars entering the highway (new bugs found).
  • Service: Cars exiting the highway (bugs being fixed).
  • The Queue: The line of cars waiting to exit.

The authors realized that traffic doesn't flow smoothly. It comes in waves. Sometimes the highway is empty; sometimes it's a gridlock.

2. Cutting the Movie into Scenes

Because the traffic flow changes so much, you can't describe the whole day with one rule. So, the authors cut the timeline into scenes (segments).

  • Scene A: Maybe it's a rainy Tuesday morning; traffic is heavy and slow.
  • Scene B: Maybe it's a sunny Friday afternoon; traffic is light and fast.

They use a mathematical tool (called a Gaussian Mixture Model) to automatically find these scenes. It's like a smart editor who watches the traffic camera and says, "Okay, the rules changed at 9:00 AM. Let's treat 9:00 AM to 11:00 AM as one scene, and 11:00 AM to 1:00 PM as another."

3. The "Reverse Engineering" Magic

Once they have the scenes, they play a guessing game.

  • They know how many cars were in the line at every second.
  • They know when cars arrived and left.
  • The Question: "How many firefighters (servers) and how fast were they working to create exactly this line of traffic?"

They run thousands of computer simulations, tweaking the number of firefighters and their speed until the simulated traffic line looks exactly like the real one. When the lines match, they know they've found the "secret recipe" of the organization's resources.

4. What They Found

They tested this on two real-world "fire stations":

  1. Open Source Software: Like a giant, public library of code where anyone can find bugs.
  2. A Huge Logistics Company: A private company with thousands of employees and complex IT systems.

The Results were amazing:

  • They could predict the number of people working on security with 91-96% accuracy, just by looking at the timestamps of bug reports.
  • They discovered that while the number of people stayed mostly the same, their speed (productivity) changed wildly depending on the time of year or specific events (like a pandemic or a new software update).
  • They found "bottlenecks"—times when the line was growing not because there were too many fires, but because the firefighters were working slower than usual.

Why Does This Matter?

This is like having a crystal ball for security managers.

  • No more guessing: You don't need to ask, "How many people do we have?" The data tells you.
  • Better planning: If you see the "line" growing in the simulation, you know you need to hire more people before the system crashes.
  • Understanding the "Why": It helps leaders see if a backlog is due to too many attacks or a lack of resources.

In short: This paper turns a messy, chaotic list of bug reports into a clear story about how many heroes are fighting the fire, how fast they are running, and when the fire station is about to get overwhelmed. It turns "security data" into "security intelligence."

Drowning in papers in your field?

Get daily digests of the most novel papers matching your research keywords — with technical summaries, in your language.

Try Digest →