Skip to main content
Journal cover image

Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild

Publication ,  Conference
Nayak, K; Marino, D; Efstathopoulos, P; Dumitraş, T
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
January 1, 2014

The security of deployed and actively used systems is a moving target, influenced by factors not captured in the existing security metrics. For example, the count and severity of vulnerabilities in source code, as well as the corresponding attack surface, are commonly used as measures of a software product's security. But these measures do not provide a full picture. For instance, some vulnerabilities are never exploited in the wild, partly due to security technologies that make exploiting them difficult. As for attack surface, its effectiveness has not been validated empirically in the deployment environment. We introduce several security metrics derived from field data that help to complete the picture. They include the count of vulnerabilities exploited and the size of the attack surface actually exercised in real-world attacks. By evaluating these metrics on nearly 300 million reports of intrusion-protection telemetry, collected on more than six million hosts, we conduct an empirical study of security in the deployment environment. We find that none of the products in our study have more than 35% of their disclosed vulnerabilities exploited in the wild. Furthermore, the exploitation ratio and the exercised attack surface tend to decrease with newer product releases. We also find that hosts that quickly upgrade to newer product versions tend to have reduced exercised attack-surfaces. The metrics proposed enable a more complete assessment of the security posture of enterprise infrastructure. Additionally, they open up new research directions for improving security by focusing on the vulnerabilities and attacks that have the highest impact in practice. © 2014 Springer International Publishing.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783319113784

Publication Date

January 1, 2014

Volume

8688 LNCS

Start / End Page

426 / 446

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Nayak, K., Marino, D., Efstathopoulos, P., & Dumitraş, T. (2014). Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8688 LNCS, pp. 426–446). https://doi.org/10.1007/978-3-319-11379-1_21
Nayak, K., D. Marino, P. Efstathopoulos, and T. Dumitraş. “Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8688 LNCS:426–46, 2014. https://doi.org/10.1007/978-3-319-11379-1_21.
Nayak K, Marino D, Efstathopoulos P, Dumitraş T. Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2014. p. 426–46.
Nayak, K., et al. “Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8688 LNCS, 2014, pp. 426–46. Scopus, doi:10.1007/978-3-319-11379-1_21.
Nayak K, Marino D, Efstathopoulos P, Dumitraş T. Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2014. p. 426–446.
Journal cover image

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783319113784

Publication Date

January 1, 2014

Volume

8688 LNCS

Start / End Page

426 / 446

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences