Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats

نویسندگان

چکیده

Software updates reduce the opportunity for exploitation. However, since can also introduce breaking changes, enterprises face problem of balancing need to secure software with support operations. We propose a methodology quantitatively investigate effectiveness strategies against attacks Advanced Persistent Threats (APTs). consider where vendor are only limiting factors cases in which delay from 1 7 months based on SANS data. Our manually curated dataset APT covers 86 APTs and 350 campaigns 2008 2020. It includes information about attack vectors, exploited vulnerabilities (e.g. 0-days vs public vulnerabilities), affected versions. Contrary common belief, most employed publicly known vulnerabilities. If an enterprise could theoretically update as soon is released, it would lower odds being compromised than those waiting one (4.9x) or three (9.1x) months. if attacked, still be 14% 33% times. As practice must do regression testing before applying update, our major finding that perform 12% all possible restricting oneself versions fixing without significant changes compared company

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Industry 4.0 against Advanced Persistent Threats

The SADCIP project has arisen from the need to deal with increasingly intelligent and autonomous industrial and monitoring systems, capable of collaborating with each other to meet a common objective: provide efficient and real-time manufacturing and logistics from anywhere, at any time and anyhow [1]. However, any new condition that implies open communication with the Internet and the adaptati...

متن کامل

Defend against advanced persistent threats: An optimal control approach

The new cyber attack pattern of advanced persistent threats (APTs) poses a serious threat to cyberspace. This paper addresses the issue of defending against APTs in a cost-effective way. First, the APT-based cyber attack-defense processes are modeled as a type of differential dynamical systems. Then, the cyber defense problem is modeled as an optimal control problem. The optimal control problem...

متن کامل

Defending Against Advanced Persistent Threats Using Game-Theory

Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailab...

متن کامل

Diagnosing Advanced Persistent Threats: A Position Paper

When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a securityrelevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have affected, at any time, a specific oper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Software Engineering

سال: 2023

ISSN: ['0098-5589', '1939-3520', '2326-3881']

DOI: https://doi.org/10.1109/tse.2022.3176674