Security Events and Vulnerability Data for Cybersecurity Risk Estimation

L. Allodi, F. Massacci

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

© 2017 Society for Risk AnalysisCurrent industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of “weaponized” vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach.
Original languageEnglish
Pages (from-to)1606-1627
JournalRisk Analysis
Volume37
Issue number8
DOIs
Publication statusPublished - 1 Aug 2017
Externally publishedYes

Funding

This work has received funding from the European Union's Seventh Framework Programme for research, technological development, and demonstration under grant agreement no. 285223 (SECONOMICS) and from the Italian PRIN Project TENACE. This work was performed while Luca Allodi was at the University of Trento which retains the relative IP. Patent application pending.

FundersFunder number
PRIN
Università degli Studi di Trento
Seventh Framework Programme285223

    Fingerprint

    Dive into the research topics of 'Security Events and Vulnerability Data for Cybersecurity Risk Estimation'. Together they form a unique fingerprint.

    Cite this