{"title":"计算有充分根据的漏洞利用概率的随机模型","authors":"Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani","doi":"10.1109/QRS-C57518.2022.00015","DOIUrl":null,"url":null,"abstract":"To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation\",\"authors\":\"Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani\",\"doi\":\"10.1109/QRS-C57518.2022.00015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.\",\"PeriodicalId\":183728,\"journal\":{\"name\":\"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)\",\"volume\":\"319 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/QRS-C57518.2022.00015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QRS-C57518.2022.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation
To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.