Vulnerability exploitation is reportedly one of the main attack vectors against computer systems. Yet, most vulnerabilities remain unexploited by attackers. It is therefore of central importance to identify vulnerabilities that carry a high 'potential for attack'. In this paper we rely on Symantec data on real attacks detected in the wild to identify a trade-off in the Impact and Complexity of a vulnerability, in terms of attacks that it generates; exploiting this effect, we devise a readily computable estimator of the vulnerability's Attack Potential that reliably estimates the expected volume of attacks against the vulnerability. We evaluate our estimator performance against standard patching policies by measuring foiled attacks and demanded workload expressed as the number of vulnerabilities entailed to patch. We show that our estimator significantly improves over standard patching policies by ruling out low-risk vulnerabilities, while maintaining invariant levels of coverage against attacks in the wild. Our estimator can be used as a first aid for vulnerability prioritisation to focus assessment efforts on high-potential vulnerabilities. © 2017 ACM.

Attack potential in impact & complexity / Allodi, L.; Massacci, F.. - STAMPA. - Volume Part F130521, 29 August 2017, Article number a32:(2017). (Intervento presentato al convegno 12th International Conference on Availability, Reliability and Security, ARES 2017 tenutosi a Reggio Calabria; Italy nel 29 August 2017 through 1 September 2017) [10.1145/3098954.3098965].

Attack potential in impact & complexity

Massacci F.
2017-01-01

Abstract

Vulnerability exploitation is reportedly one of the main attack vectors against computer systems. Yet, most vulnerabilities remain unexploited by attackers. It is therefore of central importance to identify vulnerabilities that carry a high 'potential for attack'. In this paper we rely on Symantec data on real attacks detected in the wild to identify a trade-off in the Impact and Complexity of a vulnerability, in terms of attacks that it generates; exploiting this effect, we devise a readily computable estimator of the vulnerability's Attack Potential that reliably estimates the expected volume of attacks against the vulnerability. We evaluate our estimator performance against standard patching policies by measuring foiled attacks and demanded workload expressed as the number of vulnerabilities entailed to patch. We show that our estimator significantly improves over standard patching policies by ruling out low-risk vulnerabilities, while maintaining invariant levels of coverage against attacks in the wild. Our estimator can be used as a first aid for vulnerability prioritisation to focus assessment efforts on high-potential vulnerabilities. © 2017 ACM.
2017
12th International Conference on Availability, Reliability and Security, ARES 2017
New York
Association for Computing Machinery
978-1-4503-5257-4
Allodi, L.; Massacci, F.
Attack potential in impact & complexity / Allodi, L.; Massacci, F.. - STAMPA. - Volume Part F130521, 29 August 2017, Article number a32:(2017). (Intervento presentato al convegno 12th International Conference on Availability, Reliability and Security, ARES 2017 tenutosi a Reggio Calabria; Italy nel 29 August 2017 through 1 September 2017) [10.1145/3098954.3098965].
File in questo prodotto:
File Dimensione Formato  
Allodi, L.a_Attack-potential-in-impact--complexityConference-Paper_2017.pdf

Solo gestori archivio

Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 677.92 kB
Formato Adobe PDF
677.92 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/197806
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 5
  • OpenAlex ND
social impact