Difference between revisions of "Does Information Security Attack Frequency Increase With Vulnerability Disclosure - An Empirical Analysis"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 12: Line 12:
* Issues: [[Information Sharing/Disclosure]], [[Risk Management and Investment]]
* Issues: [[Information Sharing/Disclosure]]; [[Risk Management and Investment]]
==Key Words==  
==Key Words==  

Revision as of 19:17, 23 June 2010

Full Title of Reference

Does Information Security Attack Frequency Increase With Vulnerability Disclosure? An Empirical Analysis

Full Citation

Ashish Arora, Anand Nandkumar and Rahul Telang, Does Information Security Attack Frequency Increase With Vulnerability Disclosure? An Empirical Analysis, 8 Information Systems Frontier 5 (2006). Web



Key Words

computer emergency response team, disclosure policy, zero-day exploit, honeypot, patching, software vulnerability


Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has been controversial. On one hand are those who propose full and instant disclosure whether the patch is available or not and on the other hand are those who argue for limited or no disclosure. Which of the two policies is socially optimal depends critically on how attack frequency changes with disclosure and patching. In this paper, we empirically explore the impact of vulnerability information disclosure and availability of patches on attacks targeting the vulnerability. Our results suggest that on an average both secret (non-published) and published (published and not patched) vulnerabilities attract fewer attacks than patched (published and patched) vulnerabilities. When we control for time since publication and patches, we find that patching an already known vulnerability decreases the number of attacks, although attacks gradually increase with time after patch release. Patching an unknown vulnerability, however, causes a spike in attacks, which then gradually decline after patch release. Attacks on secret vulnerabilities slowly increase with time until the vulnerability is published and then attacks rapidly decrease with time after publication.

Additional Notes and Highlights

  • Focuses on attacker behavior;
  • Concludes that theoretical frameworks regarding the effect of patching on cybersecurity are inconclusive, and that the impact of disclosure and patching upon the time trends in the number of attacks is an empirical issue;
  • Suggests areas for future research (need for new and better data sources).


 1. Introduction
 2. Literature
 3. An Economic Framework
 4. Data
  4.1. Extracting attack data
  4.2. Vulnerability data
 5. Empirical Estimates
  5.1. Average effect of patching and publishing: Results from non parametric analysis
  5.2. Vulnerability characteristics vs. vulnerability "fixed effects": Regression results
  5.3. Impact of elapsed patch and publish months—results of Tobit specification
 6. Discussion and conclusion