Attack Potential in Impact and Complexity

01/15/2018
by   Luca Allodi, et al.
0

Vulnerability exploitation is reportedly one of the main attack vectors against computer systems. Yet, most vulnerabilities remain unexploited by attackers. It is therefore of central importance to identify vulnerabilities that carry a high `potential for attack'. In this paper we rely on Symantec data on real attacks detected in the wild to identify a trade-off in the Impact and Complexity of a vulnerability, in terms of attacks that it generates; exploiting this effect, we devise a readily computable estimator of the vulnerability's Attack Potential that reliably estimates the expected volume of attacks against the vulnerability. We evaluate our estimator performance against standard patching policies by measuring foiled attacks and demanded workload expressed as the number of vulnerabilities entailed to patch. We show that our estimator significantly improves over standard patching policies by ruling out low-risk vulnerabilities, while maintaining invariant levels of coverage against attacks in the wild. Our estimator can be used as a first aid for vulnerability prioritisation to focus assessment efforts on high-potential vulnerabilities.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/27/2023

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

The number of disclosed vulnerabilities has been steadily increasing ove...
research
06/22/2022

Attack Techniques and Threat Identification for Vulnerabilities

Modern organizations struggle with insurmountable number of vulnerabilit...
research
12/11/2018

Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding

Exploitation of heap vulnerabilities has been on the rise, leading to ma...
research
03/28/2021

A Survey on Ethical Hacking: Issues and Challenges

Security attacks are growing in an exponential manner and their impact o...
research
04/26/2019

Risk Assessment of Cyber Attacks on Telemetry Enabled Cardiac Implantable Electronic Devices (CIED)

Cardiac Implantable Electronic Devices (CIED) are fast becoming a fundam...
research
04/26/2022

The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective

This paper presents a systematic study on the security of modern file sy...
research
06/14/2022

Snakes and Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery Tool

Cyber security risk assessments provide a pivotal starting point towards...

Please sign up or login with your details

Forgot password? Click here to reset