Does Information Security Attack Frequency Increase With Vulnerability Disclosure - An Empirical Analysis
Does Information Security Attack Frequency Increase With Vulnerability Disclosure? - An Empirical Analysis
Ashish Arora, Anand Nandkumar and Rahul Telang, Does Information Security Attack Frequency Increase With Vulnerability Disclosure?, 8 Information Systems Frontier 5 (2007). Web BibTeX
Categorization
- Issues: Information Sharing/Disclosure;
Risk Management and Investment
Key Words
[computer emergency response team], [disclosure policy], [exploit], [honeypot], [patching], [software vulnerability]
Synopsis
Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has been controversial. On one hand are those who propose full and instant disclosure whether the patch is available or not and on the other hand are those who argue for limited or no disclosure. Which of the two policies is socially optimal depends critically on how attack frequency changes with disclosure and patching. In this paper, we empirically explore the impact of vulnerability information disclosure and availability of patches on attacks targeting the vulnerability. Our results suggest that on an average both secret (non-published) and published (published and not patched) vulnerabilities attract fewer attacks than patched (published and patched) vulnerabilities. When we control for time since publication and patches, we find that patching an already known vulnerability decreases the number of attacks, although attacks gradually increase with time after patch release. Patching an unknown vulnerability, however, causes a spike in attacks, which then gradually decline after patch release. Attacks on secret vulnerabilities slowly increase with time until the vulnerability is published and then attacks rapidly decrease with time after publication.
Additional Notes and Highlights
- Focuses on attacker behavior;
- Concludes that theoretical frameworks regarding the effect of patching on cybersecurity are inconclusive, and that the impact of disclosure and patching upon the time trends in the number of attacks is an empirical issue;
- Suggests areas for future research.
Outline:
1. Introduction 2. Literature 3. An Economic Framework 4. Data 4.1. Extracting attack data 4.2. Vulnerability data 5. Empirical Estimates 5.1. Average effect of patching and publishing: Results from non parametric analysis 5.2. Vulnerability characteristics vs. vulnerability "fixed effects": Regression results 5.3. Impact of elapsed patch and publish months—results of Tobit specification 6. Discussion and conclusion