Does Information Security Attack Frequency Increase With Vulnerability Disclosure: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Arora_Nandkumar_Telang:2006&f=wikibiblio.bib)
 
No edit summary
Line 1: Line 1:
http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Arora_Nandkumar_Telang:2006&f=wikibiblio.bib
==Does Information Security Attack Frequency Increase With Vulnerability Disclosure? - An Empirical Analysis==
 
Ashish Arora, Anand Nandkumar, Rahul Telang, ''Does Information Security Attack Frequency Increase With Vulnerability Disclosure?'' (2007).  [http://www.heinz.cmu.edu/~rtelang/vuln_freq_ISF.pdf ''Web''] [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Arora_Nandkumar_Telang:2006&f=wikibiblio.bib''BibTeX'']
 
==Categorization==
 
Issues: [[Disclosure]]; [[Information Sharing]]; [[Information Security]]
 
==Key Words==
 
[[information security]], [[software vulnerability]], [[disclosure policy]]
 
==Synopsis==
 
Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has been controversial. On one hand are those who propose full and instant disclosure whether the patch is available or not and on the other hand are those who argue for limited or no disclosure. Which of the two policies is socially optimal depends critically on how attack frequency changes with disclosure and patching. In this paper, we empirically explore the impact of vulnerability information disclosure and availability of patches on attacks targeting the vulnerability. Our results suggest that on an average both secret (non-published) and published (published and not patched) vulnerabilities attract fewer attacks than patched (published and patched) vulnerabilities. When we control for time since publication and patches, we find that patching an already known vulnerability decreases the number of attacks, although attacks gradually increase with time after patch release. Patching an unknown vulnerability, however, causes a spike in attacks, which then gradually decline after patch release. Attacks on secret vulnerabilities slowly increase with time until the vulnerability is published and then attacks rapidly decrease with time after publication.
 
==Additional Notes and Highlights==

Revision as of 10:36, 3 June 2010

Does Information Security Attack Frequency Increase With Vulnerability Disclosure? - An Empirical Analysis

Ashish Arora, Anand Nandkumar, Rahul Telang, Does Information Security Attack Frequency Increase With Vulnerability Disclosure? (2007). Web BibTeX

Categorization

Issues: Disclosure; Information Sharing; Information Security

Key Words

information security, software vulnerability, disclosure policy

Synopsis

Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has been controversial. On one hand are those who propose full and instant disclosure whether the patch is available or not and on the other hand are those who argue for limited or no disclosure. Which of the two policies is socially optimal depends critically on how attack frequency changes with disclosure and patching. In this paper, we empirically explore the impact of vulnerability information disclosure and availability of patches on attacks targeting the vulnerability. Our results suggest that on an average both secret (non-published) and published (published and not patched) vulnerabilities attract fewer attacks than patched (published and patched) vulnerabilities. When we control for time since publication and patches, we find that patching an already known vulnerability decreases the number of attacks, although attacks gradually increase with time after patch release. Patching an unknown vulnerability, however, causes a spike in attacks, which then gradually decline after patch release. Attacks on secret vulnerabilities slowly increase with time until the vulnerability is published and then attacks rapidly decrease with time after publication.

Additional Notes and Highlights