Security Events and Vulnerability Data for Cybersecurity Risk Estimation

被引:53
作者
Allodi, Luca [1 ]
Massacci, Fabio [2 ]
机构
[1] Eindhoven Univ Technol, Fac Math & Comp Sci, Eindhoven, Netherlands
[2] Univ Trento, Dept Informat Engn & Comp Sci, Trento, Italy
关键词
Attack likelihood; cybersecurity events; quantitative risk; vulnerabilities; PROBABILISTIC RISK; EMPIRICAL-ANALYSIS; INFORMATION; MANAGEMENT; SYSTEMS; MODEL;
D O I
10.1111/risa.12864
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of weaponized vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach.
引用
收藏
页码:1606 / 1627
页数:22
相关论文
共 105 条
[1]  
Allodi L, 2017, WEIS, P1
[2]  
Allodi L, 2013, P 6 USENIX WORKSH CY, P1
[3]  
Allodi L, 2015, LECT NOTES COMPUT SC, V8978, P133, DOI 10.1007/978-3-319-15618-7_11
[4]   Comparing Vulnerability Severity and Exploits Using Case-Control Studies [J].
Allodi, Luca ;
Massacci, Fabio .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
[5]  
Anderson R, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P139
[6]  
[Anonymous], 2009, 310002009 ISOIEC
[7]  
[Anonymous], 2012, P C COMP COMM SEC
[8]  
[Anonymous], 2003, P 10 ACM C COMP COMM, DOI DOI 10.1145/948109.948137
[9]  
[Anonymous], 2016, 2016 DAT BREACH INV
[10]   How useful is quantitative risk assessment? [J].
Apostolakis, GE .
RISK ANALYSIS, 2004, 24 (03) :515-520