Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Lingyu Wang; Sushil Jajodia; Anoop Singhal; Pengsu Cheng; Steven Noel;|
|Title:||k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities|
|Published:||January 31, 2014|
|Abstract:||By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security metrics has been hindered by difficulties in handling zero day attacks exploiting unknown vulnerabilities. In fact, the security risk of unknown vulnerabilities has been considered as something unmeasurable due to the less predictable nature of software flaws. This causes a major difficulty to security metrics, because a more secure configuration would be of little value if it were equally susceptible to zero day attacks. In this paper, we propose a novel security metric, k-zero day safety, to address this issue. Instead of attempting to rank unknown vulnerabilities, our metric counts how many such vulnerabilities would be required for compromising network assets; a larger count implies more security since the likelihood of having more unknown vulnerabilities available, applicable, and exploitable all at the same time will be significantly lower.We formally define the metric, analyze the complexity of computing the metric, devise heuristic algorithms for intractable cases, and finally demonstrate through case studies that applying the metric to existing network security practices may generate actionable knowledge.|
|Citation:||IEEE Transactions on Dependable and Secure Computing|
|Pages:||pp. 30 - 44|
|Keywords:||Security metrics, network security, attack graph, network hardening, zero day attack|
|Research Areas:||Information Technology, Computer Security, Cybersecurity|
|DOI:||http://dx.doi.org/10.1109/TDSC.2013.24 (Note: May link to a non-U.S. Government webpage)|
|PDF version:||Click here to retrieve PDF version of paper (686KB)|