Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach

Author:

Yoon Seong-Su1,Kim Do-Yeon1,Kim Ka-Kyung1,Euom Ieck-Chae2ORCID

Affiliation:

1. System Security Research Center, Chonnam National University, Gwangju 61186, Republic of Korea

2. Department of Data Science, Chonnam National University, Gwangju 61186, Republic of Korea

Abstract

Security incidents targeting control systems and the industrial internet of things (IIoT) are on the rise as attackers gain a better understanding of the nature of these systems and their increasing connectivity to information technology (IT). Every year, the number of vulnerabilities associated with these incidents increases, making it impractical to apply timely patches for all of them. The current vulnerability assessments, which are the basis for vulnerability patching, have limitations in that they do not adequately reflect the risk of exploitation in the real world after discovery and do not consider operational technology (OT) and industrial control system (ICS) environments other than IT environments. This study proposes to evaluate exploit risk in real-world environments by considering OT/ICS environments and calculating three metrics, including exploit chain risk, exploit code availability, and exploit use probability based on cyber threat information, including IIoT vulnerability data, used in OT/ICS environments. In addition, we construct exploitation scenarios in a control system environment to prioritize vulnerabilities with a high risk of exploitation based on the three metrics. We show that by assessing the risk of attackers’ intentions and exploited technologies for attacks against IIoT devices in a control system environment, we can provide defenders with comprehensive attack risk information for proactive defense.

Funder

Nuclear Safety and Security Commission (NSSC) of the Republic of Korea

Korean government

MSIT (Ministry of Science and ICT), Korea

IITP

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference30 articles.

1. Addressing Industry 4.0 Cybersecurity Challenges;Culot;IEEE Eng. Manag. Rev.,2019

2. (2023, June 18). FIRST CVSS Documentation. Available online: https://www.first.org/cvss/specification-document.

3. Balsam, A., Nowak, M., Walkowski, M., Oko, J., and Sujecki, S. (2023, January 2–6). Analysis of CVSS Vulnerability Base Scores in the Context of Exploits’ Availability. Proceedings of the 2023 23rd International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania.

4. A look at the time delays in CVSS vulnerability scoring;Ruohonen;Appl. Comput. Inform.,2019

5. A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS;Arrizabalaga;ACM Comput. Surv.,2020

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3