• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于网络安全风险评估的安全事件和漏洞数据。

Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

机构信息

Faculty of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.

Department of Information Engineering and Computer Science, University of Trento, Trento, Italy.

出版信息

Risk Anal. 2017 Aug;37(8):1606-1627. doi: 10.1111/risa.12864.

DOI:10.1111/risa.12864
PMID:28800378
Abstract

Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach.

摘要

当前用于估计网络安全风险的行业标准基于定性风险矩阵,而不是定量风险估计。相比之下,大多数其他行业领域的风险评估旨在得出定量风险估计(例如金融领域的巴塞尔协议 II)。本文提出了一种模型和方法,利用组织安全运营中心的 IT 基础架构中提供的大量数据,定量估计攻击的可能性。我们的方法专门针对由自动工具发起的无目标攻击,这些工具构成了针对用户和组织的绝大多数野外攻击。我们考虑两阶段攻击,攻击者首先突破面向互联网的系统,然后利用目标中的本地漏洞将攻击升级到内部系统。我们的方法将攻击者的能力(即他/她可以利用的“武器化”漏洞的数量)作为一个因素,并可以根据组织的风险承受能力进行调整。我们使用来自大型金融机构的数据来说明我们的方法,并讨论了传统定性风险评估与我们的定量方法之间的显著不匹配。

相似文献

1
Security Events and Vulnerability Data for Cybersecurity Risk Estimation.用于网络安全风险评估的安全事件和漏洞数据。
Risk Anal. 2017 Aug;37(8):1606-1627. doi: 10.1111/risa.12864.
2
Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations.预测工业 4.0 关键基础设施中的网络安全威胁:基于攻击者动机的主动方法。
Sensors (Basel). 2023 May 6;23(9):4539. doi: 10.3390/s23094539.
3
Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.也许我们可以关闭它,然后再重新打开它?探索医疗改革以遏制网络攻击。
J Law Med Ethics. 2019 Dec;47(4_suppl):91-102. doi: 10.1177/1073110519898046.
4
Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.通过实际用例教授和学习物联网网络安全和漏洞评估以及 Shodan 的使用。
Sensors (Basel). 2020 May 27;20(11):3048. doi: 10.3390/s20113048.
5
Generator of Slow Denial-of-Service Cyber Attacks.慢速拒绝服务网络攻击生成器。
Sensors (Basel). 2021 Aug 13;21(16):5473. doi: 10.3390/s21165473.
6
A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks.电力系统恶意攻击脆弱性评估的通用框架。
Risk Anal. 2017 Nov;37(11):2182-2190. doi: 10.1111/risa.12781. Epub 2017 Feb 23.
7
Trends and best practices in health care cybersecurity insurance policy.医疗保健网络安全保险政策的趋势和最佳实践。
J Healthc Risk Manag. 2020 Oct;40(2):10-14. doi: 10.1002/jhrm.21414. Epub 2020 May 22.
8
The relationship between cybersecurity ratings and the risk of hospital data breaches.网络安全评级与医院数据泄露风险之间的关系。
J Am Med Inform Assoc. 2021 Sep 18;28(10):2085-2092. doi: 10.1093/jamia/ocab142.
9
Leveraging human factors in cybersecurity: an integrated methodological approach.利用网络安全中的人为因素:一种综合方法
Cogn Technol Work. 2022;24(2):371-390. doi: 10.1007/s10111-021-00683-y. Epub 2021 Jun 11.
10
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.使用决策理论方法探讨多方利益相关者的网络安全信息共享观点。
Risk Anal. 2018 Feb;38(2):215-225. doi: 10.1111/risa.12878. Epub 2017 Aug 11.

引用本文的文献

1
AI security and cyber risk in IoT systems.物联网系统中的人工智能安全与网络风险。
Front Big Data. 2024 Oct 10;7:1402745. doi: 10.3389/fdata.2024.1402745. eCollection 2024.
2
A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.用于分析和优化缓解对网络物理系统的网络威胁的贝叶斯框架。
Risk Anal. 2022 Oct;42(10):2275-2290. doi: 10.1111/risa.13900. Epub 2022 Mar 1.
3
The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.工作厌恶型网络攻击者模型:来自两百万攻击特征的理论与证据。
Risk Anal. 2022 Aug;42(8):1623-1642. doi: 10.1111/risa.13732. Epub 2021 May 7.
4
An Adversarial Risk Analysis Framework for Cybersecurity.一种用于网络安全的对抗风险分析框架。
Risk Anal. 2021 Jan;41(1):16-36. doi: 10.1111/risa.13331. Epub 2019 Jun 10.
5
Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.基于随机反事实风险分析的电网基础设施网络中电力线通信网络脆弱性评估
Risk Anal. 2019 Sep;39(9):2012-2031. doi: 10.1111/risa.13291. Epub 2019 Feb 27.