Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats
نویسندگان
چکیده
Software updates reduce the opportunity for exploitation. However, since can also introduce breaking changes, enterprises face problem of balancing need to secure software with support operations. We propose a methodology quantitatively investigate effectiveness strategies against attacks Advanced Persistent Threats (APTs). consider where vendor are only limiting factors cases in which delay from 1 7 months based on SANS data. Our manually curated dataset APT covers 86 APTs and 350 campaigns 2008 2020. It includes information about attack vectors, exploited vulnerabilities (e.g. 0-days vs public vulnerabilities), affected versions. Contrary common belief, most employed publicly known vulnerabilities. If an enterprise could theoretically update as soon is released, it would lower odds being compromised than those waiting one (4.9x) or three (9.1x) months. if attacked, still be 14% 33% times. As practice must do regression testing before applying update, our major finding that perform 12% all possible restricting oneself versions fixing without significant changes compared company
منابع مشابه
Protecting Industry 4.0 against Advanced Persistent Threats
The SADCIP project has arisen from the need to deal with increasingly intelligent and autonomous industrial and monitoring systems, capable of collaborating with each other to meet a common objective: provide efficient and real-time manufacturing and logistics from anywhere, at any time and anyhow [1]. However, any new condition that implies open communication with the Internet and the adaptati...
متن کاملDefend against advanced persistent threats: An optimal control approach
The new cyber attack pattern of advanced persistent threats (APTs) poses a serious threat to cyberspace. This paper addresses the issue of defending against APTs in a cost-effective way. First, the APT-based cyber attack-defense processes are modeled as a type of differential dynamical systems. Then, the cyber defense problem is modeled as an optimal control problem. The optimal control problem...
متن کاملDefending Against Advanced Persistent Threats Using Game-Theory
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailab...
متن کاملDiagnosing Advanced Persistent Threats: A Position Paper
When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a securityrelevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have affected, at any time, a specific oper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 2023
ISSN: ['0098-5589', '1939-3520', '2326-3881']
DOI: https://doi.org/10.1109/tse.2022.3176674