2015
DOI: 10.1007/978-3-319-15618-7_11
|View full text |Cite
|
Sign up to set email alerts
|

The Heavy Tails of Vulnerability Exploitation

Abstract: In this paper we analyse the frequency at which vulnerabilities are exploited in the wild by relying on data collected worldwide by Symantec's sensors. Our analysis comprises 374 exploited vulnerabilities for a total of 75.7 Million recorded attacks spanning three years (2009)(2010)(2011)(2012). We find that for some software as little as 5% of exploited vulnerabilities is responsible for about 95% of the attacks against that platform. This strongly skewed distribution is consistent for all considered software… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
25
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 18 publications
(39 citation statements)
references
References 23 publications
2
25
0
Order By: Relevance
“…ideally, uniformly), the empirical observation is widely different: out of tens of thousands of possible vulnerabilities only a fraction is actively exploited in the wild (even after controlling for observational biases) [8]. This effect is even stronger when looking at the actual volumes of attacks driven by each (exploited) vulnerability, for which we observe heavy tail distributions of attacks [4,29]. This effect also emerges for so-called 0-day vulnerabilities, i.e.…”
Section: Empirical Views On Attacksmentioning
confidence: 81%
“…ideally, uniformly), the empirical observation is widely different: out of tens of thousands of possible vulnerabilities only a fraction is actively exploited in the wild (even after controlling for observational biases) [8]. This effect is even stronger when looking at the actual volumes of attacks driven by each (exploited) vulnerability, for which we observe heavy tail distributions of attacks [4,29]. This effect also emerges for so-called 0-day vulnerabilities, i.e.…”
Section: Empirical Views On Attacksmentioning
confidence: 81%
“…This requires the definition of models that jointly evaluate attacker's and defender's strategies: (89) several independent studies showed that most attacks are driven by a handful of vulnerabilities only, suggesting that attackers choose vulnerabilities to exploit as opposed to launching attacks drawn randomly from a pool of exploits for all vulnerabilities. (46,47,103) Capturing these aspects may require to integrate socioeconomic models to evaluate attacker's incentives in marketing or buying a new vulnerability (91,102) or choosing a target. (89) We consider these aspects for future work.…”
Section: Discussionmentioning
confidence: 99%
“…(37,45) Due to the studied along the guidelines of traditional safety analysis and QRA in the same fashion that natural risks are studied. prevalence of untargeted attacks in the overall risk scenario, (38,46,47) in this article we focus on this type of attacks.…”
Section: Following Ransbotham Andmentioning
confidence: 99%
See 1 more Smart Citation
“…is is particularly unfortunate as the CVSS score gives a clear, well-de ned and readily available assessment of the vulnerability that can be used 'out-ofthe-box' to take a rst security decision on whether the vulnerability is (not) likely to represent a signi cant risk [5]. is is especially relevant as recent empirical [1] as well as analytical [3] ndings indicate that most vulnerabilities remain unexploited by a ackers. It is therefore especially important to devise measures that rule out 'low-risk' vulnerabilities to prioritize ne-grained assessments on high-potential vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%