1 1
Colorado State University Yashwant K Malaiya CS 559 Vulnerability Life Cycle
Quantitative Security
CSU Cybersecurity Center Computer Science Dept
Quantitative Security Colorado State University Yashwant K Malaiya - - PowerPoint PPT Presentation
Quantitative Security Colorado State University Yashwant K Malaiya CS 559 Vulnerability Life Cycle CSU Cybersecurity Center Computer Science Dept 1 1 Topics Vulnerability Life Cycle Vulnerability Discovery models 2 Vulnerability
1 1
CSU Cybersecurity Center Computer Science Dept
2
3
3
Exploit code (“exploit”) : usually available after disclosure
4
Attack timeline.
day attack t0 > te.
Before We Knew It An Empirical Study of Zero-Day Attacks In The Real World
5
the vulnerability, create a working exploit and use it to conduct stealth attacks against selected targets (time = te)
vulnerability, assesses its severity, assigns a priority for fixing it and starts working on a patch (time = td).
vendor or on public forums and mailing lists. A CVE identifier (e.g., CVE- 2010-2568) is assigned to the vulnerability (time = t0).
vendors release new signatures (time = ts),
vendor releases a patch for the vulnerability. After this point, the hosts that have applied the patch are no longer susceptible to the exploit (time = tp)
and the vulnerability ceases to have an impact (time = ta).
6
For a single vulnerability, the cumulative risk in a specific system at time t can be expressed as
Joh and Malaiya, "A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics" 2010
7
7
Exploit code (“exploit”) : usually available after disclosure
8
September 29, 2020
8
9
10
11
12
13
The zero-day attacks they identify lasted between
the average duration of a zero-day attack is 312 days.
Before We Knew It An Empirical Study of Zero-Day Attacks In The Real World
14
15
16
17
Gerhard Eschelbeck, The Laws of Vulnerabilities: Which security vulnerabilities really matter?, Information Security Technical Report, Volume 10, Issue 4, 2005, Pages 213-219.
18 18
CSU CyberCenter
19
2008
20
21
22
23
Time Vulnerabilities
Phase 2 Phase 1 Phase 3
24
Vulnerability time growth model
Time Vulnerabilities
25
Vulnerability time growth model
Time Vulnerabilities
Proposed by Alhazmi and Malaiya: Alhazmi Malaiya. Logistic model
26 Windows 98 A 0.004873 B 37.7328 C 0.5543 χ2 7.365 χ2critial 60.481 P-value 1- 7.6x10-11
Windows 98
5 10 15 20 25 30 35 40 45 Jan-99 Mar-99 May-99 Jul-99 Sep -99 Nov-99 Jan-00 Mar-00 May-00 Jul-00 Sep -00 Nov-00 Jan-01 Mar-01 May-01 Jul-01 Sep -01 Nov-01 Jan-02 Mar-02 May-02 Jul-02 Sep -02
Vulnerabilities
Fitted curve Total vulnerabilites
27
Windows NT 4.0 A 0.000692 B 136 C 0.52288 χ2 35.584 χ2critial 103.01 P-value 0.9999973
Windows NT 4.0
20 40 60 80 100 120 140 160 Aug-96 Dec-96 Apr-97 Aug-97 Dec-97 Apr-98 Aug-98 Dec-98 Apr-99 Aug-99 Dec-99 Apr-00 Aug-00 Dec-00 Apr-01 Aug-01 Dec-01 Apr-02 Aug-02 Dec-02 Apr-03
Vulnerabilities
Total vulnerabilities Fitted curve
28
– The global internet population. – The market share of the system during a period of time.
– The real environment performs an intensive testing. – Malicious activities is relevant to overall activities. – Defined as
Internet Growth 16 36 70 147 248 304 359 451 458 479 513 558 569 587 608 677 682 719 745 757 100 200 300 400 500 600 700 800 Dec., 1995 Dec., 1996 Dec., 1997 Dec., 1998 Dec., 1999
Jul., 2000 Dec., 2000 Mar., 2001 Jun., 2001 Aug., 2001
Jul., 2002 Sep., 2002 Mar., 2003 Sep., 2003 Oct., 2003 Dec., 2003 Feb., 2004 May, 2004 Millions of users
The percentage of the market share of O.S.
10 20 30 40 50 60 May-99 Aug-99 Nov
Feb-00 May-00 Aug-00 Nov
Feb-01 May-01 Aug-01 Nov
Feb-02 May-02 Aug-02 Nov
Feb-03 May-03 Aug-03 Nov
Feb-04 May-04 Installed Base Percentage Windows 95 Windows 98 Windows XP Windows NT Windows 2000 Others
) (
i n i i
P U E ´ = å =
29
[Musa].
5 10 15 20 25 30 35 40 750 1500 2250 3000 3750 4500 5250 6000 6750 7500
Usage (Million user's months) Vulnerabilities
vu
30
Windows 98 B 37 λvu 0.000505 χ2 3.510 χ2critial 44.9853 P-value 1- 3.3x10-11
Windows 98 5 10 15 20 25 30 35 40 750 1500 2250 3000 3750 4500 5250 6000 6750 7500
Usage (Million user's months) Vulnerabilities
Actual Vulnerabilities Fitted curve
31
Win NT 4.0 B 108 λvu 0.003061 χ2 15.05 χ2critial 42.5569 P-value 0.985
Windows NT 4.0
20 40 60 80 100 120 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5
Usage (Millions users months) Vulnerabilities
Actual Vulnerability Fitted
`
32
Windows 98
5 10 15 20 25 30 35 40 45 Jan-99 Mar-99 May-99 Jul-99 Sep -99 Nov-99 Jan-00 Mar-00 May-00 Jul-00 Sep -00 Nov-00 Jan-01 Mar-01 May-01 Jul-01 Sep -01 Nov-01 Jan-02 Mar-02 May-02 Jul-02 Sep -02
Vulnerabilities Fitted curve Total vulnerabilites
33
34
35
36
37
38
– Vulnerability densities: 95/98: 0.003-0.004 NT/2000/XP: 0.01-0.02 – VKD/DKD: 0.68-1.62% about 1%
System MSLOC Known Defects (1000s) DKD (/Kloc) Known Vulner - abilies VKD (/Kloc) Ratio VKD /DKD Win 95 15 5 0.33 46 0.0031 0.92% NT 4.0 16 10 0.625 162 0.0101 1.62% Win 98 18 10 0.556 84 0.0047 0.84% Win2000 35 63 1.8 508 0.0145 0.81% Win XP 40 106.5* 2.66* 728 0.0182 0.68%*
39
40
Halloween indicator: Low returns in May-Oct.
41
41
42
Vulnerabilities Disclosed WinNT ‘95~’07 IIS ‘96~’07 IE ‘97~’07 Jan 42 15 15 Feb 20 10 32 Mar 12 2 22 Apr 13 11 29 May 18 12 41 Jun 24 17 45 Jul 18 11 53 Aug 17 7 42 Sep 11 6 26 Oct 14 6 20 Nov 18 7 26 Dec 51 28 93 Total 258 132 444 Mean 21.5 11 37 s.d. 12.37 6.78 20.94 42
0.00 0.05 0.10 0.15 0.20 0.25 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Percentage Month
Percentage of Vuln. for Month
Win NT I I S Internet Explorer
43
Seasonal Index Values WinNT IIS IE Jan 1.95 1.36 0.41 Feb 0.93 0.91 0.86 Mar 0.56 0.81 0.59 Apr 0.60 1.00 0.78 May 0.84 1.09 1.11 Jun 1.12 1.55 1.22 Jul 0.84 1.00 1.43 Aug 0.79 0.64 1.14 Sep 0.51 0.55 0.70 Oct 0.65 0.55 0.54 Nov 0.84 0.64 0.70 Dec 2.37 2.55 2.51 19.68 19.68 19.68 78.37 46 130.43 p-value 3.04e-12 3.23e-6 1.42e-6 43
the average for a particular period tends to be above (or below) the expected value
will evaluate it using the monthly seasonal index values given by [4]: where, si is the seasonal index for ith month, di is the mean value of ith month, d is a grand average
[4] Hossein Arsham. Time-Critical Decision Making for Business Administration. Available: http://home.ubalt. edu/ntsbarsh/Business-stat/stat-data/Forecast.htm#rseasonindx
44
44
[5] B. L. Bowerman and R. T. O'connell, Time Series Forecsting: Unified concepts and computer
45
months or its multiple would have their ACF values outside confidence interval
confidence intervals.
> 0) lags behind an event
45
46
away”
– Nov.-April: 12.47% ann., st dev 12.58% – 12-months:10.92%, st. dev. 17.76%
nations
Jacobsen, Ben and Bouman, Sven,The Halloween Indicator, 'Sell in May and Go Away': Another Puzzle(July 2001). Available at SSRN: http://ssrn.com/abstract=76248
1950-2008
0.005 0.01 0.015 0.02 J a n u a r y F e b r u a r y M a r c h A p r i l M a y J u n e J u l y A u g u s t S e p t e m b e r O c t
e r N
e m b e r D e c e m b e r Return