4.6 Article

The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures

期刊

RISK ANALYSIS
卷 42, 期 8, 页码 1623-1642

出版社

WILEY
DOI: 10.1111/risa.13732

关键词

Cyber security; hackers model; risk management; update costs

资金

  1. European Union under the H2020 Programme [830929, 952647]
  2. Government of the Netherlands under the Sectorplan
  3. ITEA3 program through the DEFRAUDIfy project - Rijksdienst voor Ondernemend Nederland [ITEA191010]

向作者/读者索取更多资源

This study introduces a new attacker model based on dynamic optimization and suggests that high initial development costs lead attackers to delay exploiting vulnerabilities. The research predicts that mass attackers prefer to exploit only one vulnerability per software version and are slow in weaponizing new vulnerabilities.
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, where we demonstrate that large, initial, fixed costs of exploit development induce attackers to delay implementation and deployment of exploits of vulnerabilities. The theoretical model predicts that mass attackers will preferably (i) exploit only one vulnerability per software version, (ii) largely include only vulnerabilities requiring low attack complexity, and (iii) be slow at trying to weaponize new vulnerabilities . These predictions are empirically validated on a large data set of observed massed attacks launched against a large collection of information systems. Findings in this article allow cyber risk managers to better concentrate their efforts for vulnerability management, and set a new theoretical and empirical basis for further research defining attacker (offensive) processes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据