计算有充分根据的漏洞利用概率的随机模型

Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani
{"title":"计算有充分根据的漏洞利用概率的随机模型","authors":"Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani","doi":"10.1109/QRS-C57518.2022.00015","DOIUrl":null,"url":null,"abstract":"To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"319 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation\",\"authors\":\"Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani\",\"doi\":\"10.1109/QRS-C57518.2022.00015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.\",\"PeriodicalId\":183728,\"journal\":{\"name\":\"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)\",\"volume\":\"319 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/QRS-C57518.2022.00015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QRS-C57518.2022.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

为了有效地管理网络系统的安全风险,需要对系统中的漏洞进行评估,以确定其严重程度或优先级。贝叶斯攻击图(BAG)是一种风险分析模型,它考虑了漏洞被利用的概率(exploit probability)及其依赖关系,从而计算出系统中特定资产被泄露的概率(compromise probability)。在许多BAG分析方法中,利用概率假设与分配给相应漏洞的通用漏洞评分系统(Common Vulnerability Scoring System, CVSS)的基本指标强相关。然而,作者发现这种假设并不一定成立,因此这些方法估计的妥协概率的准确性可能会受到损害。因此,本文提出了基于漏洞和攻击的经验数据计算有充分根据的攻击概率的攻击时间概率(ETP)模型。该模型使用威布尔分布来近似国家漏洞数据库(NVD)漏洞发布和被利用之间的时间概率分布。最后,通过将etp模型应用于一个测试网络,表明该模型能够提供合理的攻击概率,是提高现有BAG分析方法准确性的一项基本技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation
To efficiently manage security risks of network systems, vulnerabilities in the systems need to be assessed to determine their severity or priority. The Bayesian attack graph (BAG) is a risk analysis model that takes into account the probabilities of vulnerability exploitation (exploit probabilities) and their dependencies to calculate the probabilities that specific assets are compromised (compromise probabilities) in a system. In many BAG analysis methods, an exploit probability is obtained assuming that it strongly correlates with base metrics of the Common Vulnerability Scoring System (CVSS) assigned to the corresponding vulnerability. However, the authors found that this assumption does not necessarily hold, and thus the accuracy of compromise probabilities estimated by these methods may be impaired. Therefore, this paper proposes the exploit time probability (ETP)-model to calculate well-founded exploit probabilities on the basis of empirical data on vulnerabilities and exploits. The model uses Weibull distributions to approximate the probability distribution of the time between the publication of a vulnerability to the National Vulnerability Database (NVD) and its exploitation. Finally, by applying the ETP-model to a test network, the model is shown to be able to provide reasonable exploit probabilities and be a fundamental technique to improve the accuracy of existing BAG analysis methods.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信