You've Got Vulnerability: Exploring Effective Vulnerability Notifications

نویسندگان

  • Frank Li
  • Zakir Durumeric
  • Jakub Czyz
  • Mohammad Karami
  • Michael Bailey
  • Damon McCoy
  • Stefan Savage
  • Vern Paxson
چکیده

Security researchers can send vulnerability notifications to take proactive measures in securing systems at scale. However, the factors affecting a notification’s efficacy have not been deeply explored. In this paper, we report on an extensive study of notifying thousands of parties of security issues present within their networks, with an aim of illuminating which fundamental aspects of notifications have the greatest impact on efficacy. The vulnerabilities used to drive our study span a range of protocols and considerations: exposure of industrial control systems; apparent firewall omissions for IPv6-based services; and exploitation of local systems in DDoS amplification attacks. We monitored vulnerable systems for several weeks to determine their rate of remediation. By comparing with experimental controls, we analyze the impact of a number of variables: choice of party to contact (WHOIS abuse contacts versus national CERTs versus US-CERT), message verbosity, hosting an information website linked to in the message, and translating the message into the notified party’s local language. We also assess the outcome of the emailing process itself (bounces, automated replies, human replies, silence) and characterize the sentiments and perspectives expressed in both the human replies and an optional anonymous survey that accompanied our notifications. We find that various notification regimens do result in different outcomes. The best observed process was directly notifying WHOIS contacts with detailed information in the message itself. These notifications had a statistically significant impact on improving remediation, and human replies were largely positive. However, the majority of notified contacts did not take action, and even when they did, remediation was often only partial. Repeat notifications did not further patching. These results are promising but ultimately modest, behooving the security community to more deeply investigate ways to improve the effectiveness of vulnerability notifications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications

After treating the notification of vulnerable parties as mere side-notes in research, the security community has recently put more focus on how to conduct vulnerability disclosure at scale. The first works in this area have shown that while notifications are helpful to a significant fraction of operators, the vast majority of systems remain unpatched. In this paper, we build on these previous w...

متن کامل

Evaluation of Water Resources Exploitation in a Karst Region Using Intrinsic Vulnerability Assessment

Groundwater vulnerability assessment is of crucial importance for land use/cover management. Some methods have been proposed specifically for the karst hydrogeological settings. Among them, COP and PaPRIKa, as two commonly applied recent methods, were adopted for the resource vulnerability assessment of a humid temperate karst region, north of Iran. Comparison of water bacterial content and dis...

متن کامل

Exploring the Impact of Topographical and Climate Factors on Generation of the Vulnerability-map of Leptospirosis

  Leptospirosis is one of the most widespread zoonotic disease caused by Leptospira bacteria. It is found wherever human is in direct or indirect contact with Leptospira bacteria thorough infected animals as well as contaminated soil or water. The disease is mostly found in tropical, subtropical, hot, and humid areas. The main objectives of this study are to investigate the seasonality relatio...

متن کامل

Introducing the Flood Vulnerability Index (FVI) as a flood crisis management tool

Background and objective: Floods are among the most dangerous natural disasters that causes loss of life and property every year. The destructive effects of floods are more documentedو due to climate change and increasing economic and social development. Social and infrastructural vulnerabilities have also increased due to human settlement adjacent to river floodplains. Therefore, to prevent mo...

متن کامل

Evaluation of Groundwater Vulnerability Using Data Mining Technique in Hashtgerd Plain

Groundwater vulnerability assessment would be one of the effective informative methods to provide a basis for determining source of pollution. Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. A common way to develop groundwater vulnerability map is DRASTIC. Meanwhile, application of the method is not easy for any aquifer due to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016