Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores

K. Kioskli, Nineta Polemi
{"title":"Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores","authors":"K. Kioskli, Nineta Polemi","doi":"10.54941/ahfe1002211","DOIUrl":null,"url":null,"abstract":"Digitalization is moving at an increasing speed in all sectors of the economy. Along with it the cybersecurity threats and attacks continue to rise rapidly. Enterprises in all economic sectors are imposed to constantly assess the vulnerabilities (weaknesses) of their Information and Communication Systems (ICT) and further estimate their severity, to avoid exploitability by targeted cyber-attacks. Attacks may have catastrophic consequences (impacts), including the disruption or termination of operations, economic damages, long-term damaged reputation, customer loss, lawsuits, and fines. Organisations need to undertake mitigating actions and technical controls to lower the severity of the vulnerabilities and protect their ICT assets. However, security measures are expensive, especially for small companies. Cybersecurity is considered a burden to the Small-Medium Enterprises (SMEs) and not a marketing advantage, while cost is their biggest challenge. We need to be as realistic as possible in the vulnerability severity scoring, to decrease the security costs for smaller companies and simultaneously prevent potential attackers to exploit their assets. Identifying the potential attacker for each sector and company is the first step in building resilience. The classifications for attackers are usually based on whether they are internal, or by their means and capabilities, such as knowledge of the organization’s resources, including personnel, facilities, information, equipment, networks, and systems. In 2021, ENISA published a sector-specific taxonomy based on opportunities, means, motives and sectors or products they wish to attack. In all existing classifications, psychological, behavioural, and social traits of the attackers are neither measured nor considered. The existing security scoring systems concentrate on technical severity, not considering the human factors with practical methods such as via the external or internal attackers’ profile in their calculations. The Common Vulnerability Scoring System (CVSS) is a standard and widely adopted measure for vulnerabilities’ severity. CVSS assumes that the potential attacker will be highly skilled, but it does not consider any other human factors which may be involved. Our work, in the latest years, targets to bridge psychosocial advancements, including human, behavioural, and psychosocial factors, with cybersecurity efforts to improve and reach a realistic cyber-resilient state within the information systems. The overarching objective of the present paper is to further contribute to providing realistic vulnerability severity scoring. Our main aim is to show that the CVSS scores are not unique for every vulnerability but vary depending on the potential attacker. Based on the organisations’ cyber threat intelligence (CTI) level, the sectoral threats can be identified, and the profiles of their potential attackers can be predicted. In this paper, we measure the attackers’ profiles and use these values in the CVSS calculator to score the vulnerabilities’ severity more accurately. Considering practical implications, multiple interventions and suggestions at various levels are presented to tackle the ongoing cybersecurity internal and external threats and also enhance the CVSS to provide more realistic and accurate results.","PeriodicalId":373044,"journal":{"name":"Human Factors in Cybersecurity","volume":"324 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Human Factors in Cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54941/ahfe1002211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Digitalization is moving at an increasing speed in all sectors of the economy. Along with it the cybersecurity threats and attacks continue to rise rapidly. Enterprises in all economic sectors are imposed to constantly assess the vulnerabilities (weaknesses) of their Information and Communication Systems (ICT) and further estimate their severity, to avoid exploitability by targeted cyber-attacks. Attacks may have catastrophic consequences (impacts), including the disruption or termination of operations, economic damages, long-term damaged reputation, customer loss, lawsuits, and fines. Organisations need to undertake mitigating actions and technical controls to lower the severity of the vulnerabilities and protect their ICT assets. However, security measures are expensive, especially for small companies. Cybersecurity is considered a burden to the Small-Medium Enterprises (SMEs) and not a marketing advantage, while cost is their biggest challenge. We need to be as realistic as possible in the vulnerability severity scoring, to decrease the security costs for smaller companies and simultaneously prevent potential attackers to exploit their assets. Identifying the potential attacker for each sector and company is the first step in building resilience. The classifications for attackers are usually based on whether they are internal, or by their means and capabilities, such as knowledge of the organization’s resources, including personnel, facilities, information, equipment, networks, and systems. In 2021, ENISA published a sector-specific taxonomy based on opportunities, means, motives and sectors or products they wish to attack. In all existing classifications, psychological, behavioural, and social traits of the attackers are neither measured nor considered. The existing security scoring systems concentrate on technical severity, not considering the human factors with practical methods such as via the external or internal attackers’ profile in their calculations. The Common Vulnerability Scoring System (CVSS) is a standard and widely adopted measure for vulnerabilities’ severity. CVSS assumes that the potential attacker will be highly skilled, but it does not consider any other human factors which may be involved. Our work, in the latest years, targets to bridge psychosocial advancements, including human, behavioural, and psychosocial factors, with cybersecurity efforts to improve and reach a realistic cyber-resilient state within the information systems. The overarching objective of the present paper is to further contribute to providing realistic vulnerability severity scoring. Our main aim is to show that the CVSS scores are not unique for every vulnerability but vary depending on the potential attacker. Based on the organisations’ cyber threat intelligence (CTI) level, the sectoral threats can be identified, and the profiles of their potential attackers can be predicted. In this paper, we measure the attackers’ profiles and use these values in the CVSS calculator to score the vulnerabilities’ severity more accurately. Considering practical implications, multiple interventions and suggestions at various levels are presented to tackle the ongoing cybersecurity internal and external threats and also enhance the CVSS to provide more realistic and accurate results.
估计攻击者的配置文件可以获得更真实的漏洞严重性评分
数字化在经济的各个领域都在以越来越快的速度发展。与此同时,网络安全威胁和攻击持续快速上升。所有经济部门的企业都必须不断评估其信息和通信系统(ICT)的漏洞(弱点),并进一步评估其严重程度,以避免被针对性的网络攻击所利用。攻击可能造成灾难性的后果(影响),包括业务中断或终止、经济损失、长期声誉受损、客户流失、诉讼和罚款。组织需要采取缓解措施和技术控制来降低漏洞的严重性并保护其ICT资产。然而,安全措施是昂贵的,尤其是对小公司。网络安全被认为是中小企业的负担,而不是营销优势,而成本是他们最大的挑战。我们需要在漏洞严重性评分中尽可能地现实,以减少小公司的安全成本,同时防止潜在的攻击者利用他们的资产。确定每个部门和公司的潜在攻击者是建立弹性的第一步。攻击者的分类通常是基于他们是内部的,还是基于他们的手段和能力,比如对组织资源的了解,包括人员、设施、信息、设备、网络和系统。2021年,ENISA发布了基于机会、手段、动机以及他们希望攻击的行业或产品的特定行业分类。在所有现有的分类中,既不衡量也不考虑攻击者的心理、行为和社会特征。现有的安全评分系统侧重于技术严重性,而没有考虑人为因素,采用实用的方法,如通过外部或内部攻击者的个人资料进行计算。通用漏洞评分系统(Common Vulnerability Scoring System, CVSS)是一种标准的、被广泛采用的漏洞严重程度度量方法。CVSS假定潜在的攻击者将是高度熟练的,但它不考虑可能涉及的任何其他人为因素。近年来,我们的工作目标是将社会心理进步(包括人、行为和社会心理因素)与网络安全工作相结合,以改善和实现信息系统内现实的网络弹性状态。本文的总体目标是进一步有助于提供现实的脆弱性严重性评分。我们的主要目的是显示CVSS分数不是每个漏洞唯一的,而是根据潜在的攻击者而变化。根据组织的网络威胁情报(CTI)水平,可以识别部门威胁,并预测潜在攻击者的概况。在本文中,我们测量了攻击者的配置文件,并在CVSS计算器中使用这些值来更准确地评分漏洞的严重程度。考虑到实际影响,提出了不同层次的多种干预措施和建议,以解决持续存在的网络安全内部和外部威胁,并增强CVSS以提供更现实和准确的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信