Download PDFOpen PDF in browserForecasting Vulnerability Sightings Under Data Scarcity: Modeling Sparse and Bursty Cyber Threat SignalsEasyChair Preprint 1601212 pages•Date: January 31, 2026AbstractVulnerability prioritization increasingly depends on understanding when a weakness becomes active in the real world—whether through PoC releases, scanner detections, or exploitation chatter. While existing scoring systems quantify potential impact, few approaches attempt to forecast how attention toward a vulnerability will evolve over time. In this presentation, we explore whether short-term forecasting of vulnerability sightings is feasible when data are extremely sparse, noisy, and burst-driven, as often observed in open intelligence sources. Building on the VLAI model, a transformer-based system that predicts CVSS-like severity from textual descriptions, we test multiple statistical approaches for forecasting sightings at the granularity of individual CVEs. We evaluate SARIMAX, Poisson regression, logistic growth, and exponential decay models on real-world data collected from exploit feeds, Fediverse monitoring, and shadowserver-like telemetry. Our experiments reveal that classical time-series models struggle under short observation windows and high variance, frequently yielding unstable or even negative predictions. Count-based regression and simple growth/decay functions, however, produce more interpretable results and naturally avoid impossible outputs. We present practical strategies for operational forecasting—automated model selection based on trend detection, real-time updates, and the integration of semantic severity signals. The talk focuses on actionable lessons for CTI teams: what is realistic to forecast, which models fail in practice, and how predictive analytics can help defenders anticipate activity spikes and patching urgency even when only limited early-life data is available. Keyphrases: Exponential decay, Poisson regression, Sparse Time Series, VLAI Severity Modeling, Vulnerability Forecasting, cyber threat intelligence
|

