A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation

Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani
{"title":"A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation","authors":"Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani","doi":"10.1109/QRS-C57518.2022.00015","DOIUrl":null,"url":null,"abstract":"To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QRS-C57518.2022.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
计算有充分根据的漏洞利用概率的随机模型
为了有效地管理网络系统的安全风险,需要对系统中的漏洞进行评估,以确定其严重程度或优先级。贝叶斯攻击图(BAG)是一种风险分析模型,它考虑了漏洞被利用的概率(exploit probability)及其依赖关系,从而计算出系统中特定资产被泄露的概率(compromise probability)。在许多BAG分析方法中,利用概率假设与分配给相应漏洞的通用漏洞评分系统(Common Vulnerability Scoring System, CVSS)的基本指标强相关。然而,作者发现这种假设并不一定成立,因此这些方法估计的妥协概率的准确性可能会受到损害。因此,本文提出了基于漏洞和攻击的经验数据计算有充分根据的攻击概率的攻击时间概率(ETP)模型。该模型使用威布尔分布来近似国家漏洞数据库(NVD)漏洞发布和被利用之间的时间概率分布。最后,通过将etp模型应用于一个测试网络,表明该模型能够提供合理的攻击概率,是提高现有BAG分析方法准确性的一项基本技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Software Bug Prediction based on Complex Network Considering Control Flow A Fault Localization Method Based on Similarity Weighting with Unlabeled Test Cases What Should Abeeha do? an Activity for Phishing Awareness The Real-Time General Display and Control Platform Designing Method based on Software Product Line Code Search Method Based on Multimodal Representation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1