Home > Research > Publications & Outputs > Quantitative assessment of software vulnerabili...

Links

Text available via DOI:

View graph of relations

Quantitative assessment of software vulnerabilities based on economic-driven security metrics

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Published

Standard

Quantitative assessment of software vulnerabilities based on economic-driven security metrics. / Ghani, H.; Luna, J.; Suri, Neeraj.

2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. p. 1-8.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Harvard

Ghani, H, Luna, J & Suri, N 2013, Quantitative assessment of software vulnerabilities based on economic-driven security metrics. in 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, pp. 1-8. https://doi.org/10.1109/CRiSIS.2013.6766361

APA

Ghani, H., Luna, J., & Suri, N. (2013). Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS) (pp. 1-8). IEEE. https://doi.org/10.1109/CRiSIS.2013.6766361

Vancouver

Ghani H, Luna J, Suri N. Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE. 2013. p. 1-8 https://doi.org/10.1109/CRiSIS.2013.6766361

Author

Ghani, H. ; Luna, J. ; Suri, Neeraj. / Quantitative assessment of software vulnerabilities based on economic-driven security metrics. 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. pp. 1-8

Bibtex

@inproceedings{8e111c89592640d2919848052845cec8,
title = "Quantitative assessment of software vulnerabilities based on economic-driven security metrics",
abstract = "Vulnerability exploits cost organizations large amounts of resources, mainly due to disruption of ICT services, and thus loss of confidentiality, integrity and availability. As security managers in the industry usually have to operate with limited budgets allocated to information security, they need to prioritize their investment efforts regarding the response mechanisms to the existing vulnerabilities. The utilization of quantitative security vulnerability assessment methods enables efficient prioritization of security efforts and investments to mitigate the discovered vulnerabilities and thus an opportunity to lower expected losses. State of the art approaches for vulnerability assessment such as the Common Vulnerability Scoring System (CVSS), which is the de facto standard quantifying the severity of vulnerabilities, do not consider the economic impact in case of a vulnerability exploit. To this end, our paper targets the quantitative understanding of vulnerability severity taking into account the potential economic damage a successful vulnerability exploit can cause. We propose a novel approach for a systematic consideration of the relevant cost units (associated costs) for the economic damage estimation of vulnerability exploits. Our approach utilizes Multiple Criteria Decision Analysis (MCDA) methods to perform a prioritization of the existing vulnerabilities within the target system. The evaluation results show the potential cost savings w.r.t. the mitigation costs using our approach. Our method supports managers and decision makers in the process of prioritizing security investments to mitigate the discovered vulnerabilities. {\textcopyright} 2013 IEEE.",
keywords = "CVSS, economic-driven security metrics, MCDA, security quantification, vulnerability assessment, Costs, Internet, Investments, Managers, Operations research, Security systems, Security metrics, Vulnerability assessments, Security of data",
author = "H. Ghani and J. Luna and Neeraj Suri",
year = "2013",
month = oct
day = "23",
doi = "10.1109/CRiSIS.2013.6766361",
language = "English",
pages = "1--8",
booktitle = "2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Quantitative assessment of software vulnerabilities based on economic-driven security metrics

AU - Ghani, H.

AU - Luna, J.

AU - Suri, Neeraj

PY - 2013/10/23

Y1 - 2013/10/23

N2 - Vulnerability exploits cost organizations large amounts of resources, mainly due to disruption of ICT services, and thus loss of confidentiality, integrity and availability. As security managers in the industry usually have to operate with limited budgets allocated to information security, they need to prioritize their investment efforts regarding the response mechanisms to the existing vulnerabilities. The utilization of quantitative security vulnerability assessment methods enables efficient prioritization of security efforts and investments to mitigate the discovered vulnerabilities and thus an opportunity to lower expected losses. State of the art approaches for vulnerability assessment such as the Common Vulnerability Scoring System (CVSS), which is the de facto standard quantifying the severity of vulnerabilities, do not consider the economic impact in case of a vulnerability exploit. To this end, our paper targets the quantitative understanding of vulnerability severity taking into account the potential economic damage a successful vulnerability exploit can cause. We propose a novel approach for a systematic consideration of the relevant cost units (associated costs) for the economic damage estimation of vulnerability exploits. Our approach utilizes Multiple Criteria Decision Analysis (MCDA) methods to perform a prioritization of the existing vulnerabilities within the target system. The evaluation results show the potential cost savings w.r.t. the mitigation costs using our approach. Our method supports managers and decision makers in the process of prioritizing security investments to mitigate the discovered vulnerabilities. © 2013 IEEE.

AB - Vulnerability exploits cost organizations large amounts of resources, mainly due to disruption of ICT services, and thus loss of confidentiality, integrity and availability. As security managers in the industry usually have to operate with limited budgets allocated to information security, they need to prioritize their investment efforts regarding the response mechanisms to the existing vulnerabilities. The utilization of quantitative security vulnerability assessment methods enables efficient prioritization of security efforts and investments to mitigate the discovered vulnerabilities and thus an opportunity to lower expected losses. State of the art approaches for vulnerability assessment such as the Common Vulnerability Scoring System (CVSS), which is the de facto standard quantifying the severity of vulnerabilities, do not consider the economic impact in case of a vulnerability exploit. To this end, our paper targets the quantitative understanding of vulnerability severity taking into account the potential economic damage a successful vulnerability exploit can cause. We propose a novel approach for a systematic consideration of the relevant cost units (associated costs) for the economic damage estimation of vulnerability exploits. Our approach utilizes Multiple Criteria Decision Analysis (MCDA) methods to perform a prioritization of the existing vulnerabilities within the target system. The evaluation results show the potential cost savings w.r.t. the mitigation costs using our approach. Our method supports managers and decision makers in the process of prioritizing security investments to mitigate the discovered vulnerabilities. © 2013 IEEE.

KW - CVSS

KW - economic-driven security metrics

KW - MCDA

KW - security quantification

KW - vulnerability assessment

KW - Costs

KW - Internet

KW - Investments

KW - Managers

KW - Operations research

KW - Security systems

KW - Security metrics

KW - Vulnerability assessments

KW - Security of data

U2 - 10.1109/CRiSIS.2013.6766361

DO - 10.1109/CRiSIS.2013.6766361

M3 - Conference contribution/Paper

SP - 1

EP - 8

BT - 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)

PB - IEEE

ER -