The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Title | The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Zieger, Andrej, Freiling, Felix, Kossakowski, Klaus-Peter |
Conference Name | 2018 11th International Conference on IT Security Incident Management IT Forensics (IMF) |
ISBN Number | 978-1-5386-6632-6 |
Keywords | complex system modeling, complex systems, Complexity theory, Computer science, continuous attacker skill, CVSS vectors, cyber threat intelligence, cyber-security, cybersecurity metrics, Estimation, Human Behavior, human factors, individual systems, IT-security, Large-scale systems, mathematical shortcomings, Measurement, methodological shortcomings, Metrics, national CERT, original TTC, practical cyber security risk estimation, pubcrawl, resilience, Resiliency, risk management, Risk-Estimation, Risk-Metric, Scalability, security of data, Security Risk Estimation, Security-Metric, Threat Landscape, time-to-compromise metric, vulnerability database, β-distribution |
Abstract | To manage cybersecurity risks in practice, a simple yet effective method to assess suchs risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a system remains uncompromised given a specific threat landscape. Unlike other approaches that require complex system modeling to proceed, TTC combines simplicity with expressiveness and therefore has evolved into one of the most successful cybersecurity metrics in practice. We revisit TTC and identify several mathematical and methodological shortcomings which we address by embedding all aspects of the metric into the continuous domain and the possibility to incorporate information about vulnerability characteristics and other cyber threat intelligence into the model. We propose $\beta$-TTC, a formal extension of TTC which includes information from CVSS vectors as well as a continuous attacker skill based on a $\beta$-distribution. We show that our new metric (1) remains simple enough for practical use and (2) gives more realistic predictions than the original TTC by using data from a modern and productively used vulnerability database of a national CERT. |
URL | https://ieeexplore.ieee.org/document/8514838 |
DOI | 10.1109/IMF.2018.00017 |
Citation Key | zieger_-time–compromise_2018 |
- Risk-Metric
- national CERT
- original TTC
- practical cyber security risk estimation
- pubcrawl
- resilience
- Resiliency
- risk management
- Risk-Estimation
- Metrics
- Scalability
- security of data
- Security Risk Estimation
- Security-Metric
- Threat Landscape
- time-to-compromise metric
- vulnerability database
- β-distribution
- estimation
- complex systems
- Complexity theory
- computer science
- continuous attacker skill
- CVSS vectors
- cyber threat intelligence
- Cyber-security
- cybersecurity metrics
- complex system modeling
- Human behavior
- Human Factors
- individual systems
- IT-security
- Large-scale systems
- mathematical shortcomings
- Measurement
- methodological shortcomings