The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures

被引:11
作者
Allodi, Luca [1 ]
Massacci, Fabio [2 ,3 ]
Williams, Julian [4 ]
机构
[1] Tech Univ Eindhoven, Groene Loper 5,TU E Sci Pk,Bldg MetaForum, NL-5612 AE Eindhoven, Netherlands
[2] Univ Trento, Via Sommar 9, Povo, Trento, Italy
[3] Vrije Univ Amsterdam, Boelelaan 1111, Amsterdam, Netherlands
[4] Univ Durham, Business Sch, Mill Hill Lane, Durham, England
基金
欧盟地平线“2020”;
关键词
Cyber security; hackers model; risk management; update costs; RISK ANALYSIS; SECURITY; GAME; DISCOVERY; DEFENSE; TIME;
D O I
10.1111/risa.13732
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, where we demonstrate that large, initial, fixed costs of exploit development induce attackers to delay implementation and deployment of exploits of vulnerabilities. The theoretical model predicts that mass attackers will preferably (i) exploit only one vulnerability per software version, (ii) largely include only vulnerabilities requiring low attack complexity, and (iii) be slow at trying to weaponize new vulnerabilities . These predictions are empirically validated on a large data set of observed massed attacks launched against a large collection of information systems. Findings in this article allow cyber risk managers to better concentrate their efforts for vulnerability management, and set a new theoretical and empirical basis for further research defining attacker (offensive) processes.
引用
收藏
页码:1623 / 1642
页数:20
相关论文
共 72 条
[41]   Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises [J].
Kotzias, Platon ;
Bilge, Leyla ;
Vervier, Pierre-Antoine ;
Caballero, Juan .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[42]   Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports [J].
Kuper, Gabriel ;
Massacci, Fabio ;
Shim, Woohyun ;
Williams, Julian .
RISK ANALYSIS, 2020, 40 (05) :1001-1019
[43]   Mandatory Standards and Organizational Information Security [J].
Lee, Chul Ho ;
Geng, Xianjun ;
Raghunathan, Srinivasan .
INFORMATION SYSTEMS RESEARCH, 2016, 27 (01) :70-86
[44]   Game Theory Meets Network Security and Privacy [J].
Manshaei, Mohammad Hossein ;
Zhu, Quanyan ;
Alpcan, Tansu ;
Basar, Tamer ;
Hubaux, Jean-Pierre .
ACM COMPUTING SURVEYS, 2013, 45 (03)
[45]  
Massacci, 2013, CVSS IS DOSSING YOUR
[46]  
Mell Peter, 2007, Forum Incident Response Secur. Teams (FIRST), V1
[47]   Information Disclosure and the Diffusion of Information Security Attacks [J].
Mitra, Sabyasachi ;
Ransbotham, Sam .
INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) :565-584
[48]   Chip and PIN is Broken [J].
Murdoch, Steven J. ;
Drimer, Saar ;
Anderson, Ross ;
Bond, Mike .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :433-446
[49]   The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching [J].
Nappa, Antonio ;
Johnson, Richard ;
Bilge, Leyla ;
Caballero, Juan ;
Dumitras, Tudor .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :692-708
[50]  
Nataliia Bielova., 2015, LECT NOTES COMPUTER, V8978