Skip to main content

Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks

  • Chapter
  • First Online:
Cyber Warfare

Part of the book series: Advances in Information Security ((ADIS,volume 56))

Abstract

The security of deployed and actively used systems is a moving target, influenced by factors that are not captured in the existing security models and metrics. For example, estimating the number of vulnerabilities in source code does not account for the fact that cyber attackers never exploit some of the discovered vulnerabilities, in the presence of reduced attack surfaces and of technologies that render exploits less likely to succeed. Conversely, some vulnerabilities are exploited stealthily before their public disclosure, in zero-day attacks, and old vulnerabilities continue to impact security in the wild until all vulnerable hosts are patched. As such,we currently do not know how to assess the security of systems in active use. In this chapter, we report on empirical studies of security in the real world, using field data collected on 10+ million real hosts that are targeted by cyber attacks (rather than on honeypots or in small-scale lab settings). Our empirical findings and the novel metrics we evaluate on this field data will enable a more accurate assessment of the risk of cyber attacks, by taking into account the vulnerabilities and attacks that matter most in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Approximate lines of code, in millions: Windows 2000\(\simeq 30\), Windows XP\(\simeq 45\), Windows Server 2003\(\simeq 50\), Windows Vista, Windows 7\(> 50\) (http://bit.ly/RKDHIm;http://bit.ly/5LkKx,http://tek.io/g3rBrB).

References

Download references

Acknowledgements

This research would not have been possible without the WINE platform, built and made available to the research community by Symantec. Our results can be reproduced by utilizing the reference data setsWINE 2012-003 andWINE-2014-001, archived in the WINE infrastructure.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tudor Dumitraş .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Dumitraş, T. (2015). Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds) Cyber Warfare. Advances in Information Security, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-319-14039-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14039-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14038-4

  • Online ISBN: 978-3-319-14039-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics